[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Published on in Vol 26 (2024)

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/59674, first published .
Patient Health Record Protection Beyond the Health Insurance Portability and Accountability Act: Mixed Methods Study

Patient Health Record Protection Beyond the Health Insurance Portability and Accountability Act: Mixed Methods Study

Patient Health Record Protection Beyond the Health Insurance Portability and Accountability Act: Mixed Methods Study

Authors of this article:

Hemang Subramanian1 Author Orcid Image ;   Arijit Sengupta1 Author Orcid Image ;   Yilin Xu1 Author Orcid Image

Original Paper

Florida International University, Miami, FL, United States

*all authors contributed equally

Corresponding Author:

Hemang Subramanian, BE, EMBA, MS, PhD

Florida International University

11200 SW 8th Street

Miami, FL, 33199-2156

United States

Phone: 1 3053488446

Email: hsubrama@fiu.edu


Background: The security and privacy of health care information are crucial for maintaining the societal value of health care as a public good. However, governance over electronic health care data has proven inefficient, despite robust enforcement efforts. Both federal (HIPAA [Health Insurance Portability and Accountability Act]) and state regulations, along with the ombudsman rule, have not effectively reduced the frequency or impact of data breaches in the US health care system. While legal frameworks have bolstered data security, recent years have seen a concerning increase in breach incidents. This paper investigates common breach types and proposes best practices derived from the data as potential solutions.

Objective: The primary aim of this study is to analyze health care and hospital breach data, comparing it against HIPAA compliance levels across states (spatial analysis) and the impact of the Omnibus Rule over time (temporal analysis). The goal is to establish guidelines for best practices in handling sensitive information within hospitals and clinical environments.

Methods: The study used data from the Department of Health and Human Services on reported breaches, assessing the severity and impact of each breach type. We then analyzed secondary data to examine whether HIPAA’s storage and retention rule amendments have influenced security and privacy incidents across all 50 states. Finally, we conducted a qualitative analysis of textual data from vulnerability and breach reports to identify actionable best practices for health care settings.

Results: Our findings indicate that hacking or IT incidents have the most significant impact on the number of individuals affected, highlighting this as a primary breach category. The overall difference-in-differences trend reveals no significant reduction in breach rates (P=.50), despite state-level regulations exceeding HIPAA requirements and the introduction of the ombudsman rule. This persistence in breach trends implies that even strengthened protections and additional guidelines have not effectively curbed the rising number of affected individuals. Through qualitative analysis, we identified 15 unique values and associated best practices from industry standards.

Conclusions: Combining quantitative and qualitative insights, we propose the “SecureSphere framework” to enhance data security in health care institutions. This framework presents key security values structured in concentric circles: core values at the center and peripheral values around them. The core values include employee management, policy, procedures, and IT management. Peripheral values encompass the remaining security attributes that support these core elements. This structured approach provides a comprehensive security strategy for protecting patient health information and is designed to help health care organizations develop sustainable practices for data security.

J Med Internet Res 2024;26:e59674

doi:10.2196/59674

Keywords



Overview

The HIPAA (Health Insurance Portability and Accountability Act) [1] was enacted by the United States Congress aiming to develop a set of guidelines by which personally identifiable information maintained by health care providers and insurers is protected from fraud, theft, and unauthorized access. At the most general level, HIPAA prevents health care providers from disclosing such information to anyone other than the patient herself and their health providers without explicit consent from the patient. Since its enactment in 1996, it has been implemented in all states of the United States and is widely accepted by both patients and medical providers [2]. HIPAA is now a globally accepted public health law that governs the protection and security of patient health information. Many countries globally also implement various aspects of HIPAA compliance as a measure of security and protection of personal health record (PHR) data [3].

Presently, HIPAA is enforced, and failures to adhere to the act may result in civil and criminal penalties. While the enactment of HIPAA has certainly increased the privacy of patient information, the attempts at subverting the protection and illegally accessing private information have also increased multiple fold. In this paper, we analyze a publicly available dataset related to data breaches in health care systems with both quantitative and qualitative methods to decide how effective HIPAA has been and what current health care systems may need to do to protect individuals from such breaches.

In HIPAA, Privacy and Security Rules work together to protect the privacy and security of individuals’ PHR information. The Privacy Rule focuses on limiting how PHR can be used and disclosed, while the Security Rule focuses on protecting the confidentiality, integrity, and availability of electronic protected health information through technical and administrative safeguards. Both rules are enforced by the Department of Health and Human Services (HHS) and aim to protect individuals’ health information from unauthorized access, use, and disclosure. Table 1 compares the HIPAA Privacy Rule with the HIPAA Security Rule with respect to the most common attributes that concern health care data protection.

Table 1. Comparing the HIPAA (Health Insurance Portability and Accountability Act) Privacy Rule and HIPAA Security Rule across various features of the rule.
FeaturesHIPAA Privacy RuleHIPAA Security Rule
PurposeProtects the privacy of an individual’s health informationProtects the security of ePHIa
Covered entitiesHealth plans, health care clearinghouses, and health care providersCovered entities and their business associates
Privacy standardsLimits how covered entities can use and disclose PHIbEnsures confidentiality, integrity, and availability of ePHI
Required measuresCovered entities must have policies and procedures in place to protect PHICovered entities must implement administrative, physical, and technical safeguards to protect ePHI
Access controlsCovered entities must limit access to PHI to authorized individualsCovered entities must implement technical policies and procedures to control access to ePHI
Data encryptionRequired only for ePHI transmitted over an open networkRequired for all ePHI, both in transit and for storage of data
Breach notificationCovered entities must report breaches of PHI to affected individuals and the HHScCovered entities must notify affected individuals, HHS, and the media (for large breaches) of any breach of unsecured ePHI
EnforcementEnforced by the HHS OCRdEnforced by the HHS OCR and the HHS Office of the Inspector General

aePHI: electronic protected health information.

bPHI: protected health information.

cHHS: Department of Health and Human Services.

dOCR: Office for Civil Rights.

Despite stringent HIPAA rules affecting both the privacy and security of PHR data and their implementation, we observe an increase in attack surface and loss of PHR across US hospital systems. In this paper, using health vulnerability data from hospital systems over 15 years, we study the following research question: What are the best practices to protect the security and privacy of PHR data in hospital information systems in addition to HIPAA, state-specific security guidelines, and Omnibus regulations?

To answer the above research question, we use an extensive dataset of health data breaches from January 2009 to January 2023 published by the US HHS [4]. First, we analyze different health data system vulnerabilities by finding the correlation between the number of users affected and the various parameters and types of vulnerabilities. We further look at the different types of vulnerabilities, create clusters of states based on the extent of HIPAA adoption, and analyze vulnerabilities between these clusters. We then introduce the Omnibus Rule as an exogenous shock to see the effect of this rule on the breaches. Finally, we create a cluster of the types of vulnerabilities based on a qualitative analysis of the breach information description to identify the security “values” that are important to protect health care systems, which should provide guidance to future protection systems.

In summary, the aim of this paper is to analyze the data from existing health care security breaches and cross-compare the information against the extent of HIPAA adoption across the states (spatial) as well as the effect of the Omnibus Rule (temporal) to provide key health care security guidelines.

Background and Literature Review

Much of the health care privacy and security literature falls in the realm of PHRs, specifically electronic health records (EHRs). Unlike other security-intensive information such as banking and taxation, health records have more transparency and must be viewed by and shared with multiple health personnel. Therefore, privacy and security are important drivers in adopting health data, particularly PHRs. A 2008 Markle Foundation survey [5] of 1580 adults reported privacy concerns related to the misuse of personal data by marketers (77%), employers (56%), and insurers (53%). While the report states that American people overwhelmingly believe that EHRs can improve their health, most participants were concerned about privacy factors. The main areas of concern were identity theft and limitation of employment opportunities due to specific health conditions and hence preferred to control who could access their health information.

Other studies also concur with the above findings. A study by Keselman et al [6] specifically mentions that security in PHR access must be configured to support privacy and security without violating HIPAA requirements. In another focus group study by Kerns et al [7], participants strongly opposed commercially developed PHRs and cited issues with privacy, security, and accuracy as a deterrent to adoption. Several studies identify potential security concerns related to data sharing, tampering, improper use, and illegal tracking as well as manipulation by third parties [8,9]. Despite the security concerns, new patients mostly prefer to engage electronically for their PHRs [6,7] so enhancing the security of the systems and databases that are used for the storage and transmission of such data has become a priority.

Despite the potential concerns among users about having highly personal health information in shared electronic infrastructure, having massive amounts of information of health information allows health providers to better identify and manage high-risk and high-cost patients, thereby benefiting both the health providers as well as patients [10]. This has been made using clinical analytics—big data techniques to reduce the costs of health care by identifying high-cost patients, readmissions, triage, decompensation, adverse events, and treatment optimization for diseases affecting multiple organ systems. Such techniques require careful aggregation and data integrity techniques to ensure that all associations are privacy-preserving and not subject to inappropriate tampering [11].

While the HIPAA regulations do provide the possibility of comparative effectiveness studies, they also introduce barriers including inconsistent institutional review board policies and complicated and costly procedures to obtain the consent of patients for release of their information. This necessitates the development of a new policy framework that will allow and encourage the use of health information in all forms—fully identifiable, partially anonymized, and deidentified [12].

Development of a new framework around providing security to health information will require the reduction in ambiguity and confusion surrounding the concept of “health security,” particularly when combining information from diverse global sources. To counteract this, the global public health community will need to develop a common understanding of the security protocols that involve stakeholders in developing countries, industrialized countries, the humanitarian community, as well as military organizations [13].

Multiple techniques have been proposed in the literature for securing and preserving the anonymity and privacy of EHR clients’ symmetric and asymmetric keys for deidentification [14]. Access control, encryption, and auditing tools have also been proposed and developed [15]. Health care organizations are also developing privacy architecture using a combination of enterprise data warehouse and a software intelligence and analytics layer to counteract these threats. One such system developed by Houston Methodist Hospital [16] uses methods like specialized derecognizable proof of information, limited information access, and security controls in the hidden specialized stages to safeguard patient protection. Many other current efforts also use different forms of anonymization and encryption to preserve security and privacy [17]. The most prominent other features that are essential in such privacy preservation include system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanisms, policies and regulation, applicability and scalability, and cryptography techniques [18].

Prior research by Peddicord et al [12] similarly identifies barriers to research initiatives imposed by HIPAA and provides a policy-based framework as a collaborative mechanism for creating a process of managed consent and development of a research safe harbor to protect the privacy of health information. Similar governance frameworks have also been reviewed in general public and government sector implementations [19]. Having partnerships between the public and private sectors in such governance is important to ensure such reforms are successful in any information and communication technology solutions [20].

Other comparable techniques used in the literature for maintaining integrity in big data in EHR include blockchain-based solutions [11,21]. Privacy issues surrounding health data have become increasingly prevalent in recent years, particularly with the rise of EHRs and other digital health technologies.

The sensitive nature of health data makes it particularly vulnerable to privacy breaches, which can have serious consequences for individuals, health care providers, and health care systems. Recent studies have found that blockchain-based EHRs can give patients greater control over their data while ensuring their information is kept secure and confidential. Similarly, blockchains can be used to create a secure and private platform for sharing medical data among health care providers without compromising patient privacy [19].

HIPAA Privacy Rule and Security Rule

To protect health data across multiple sources and stakeholders, various safeguards have been researched in the literature. These methods include physical safeguards such as physical locks and other access control methods for computers and other equipment; technical safeguards such as encryption, firewalls, strong passwords, antivirus and antimalware systems, mobile agents, and dual authentication schemes; and administrative safeguards such as risk assessments, personal device use policies, and deidentification of samples [22].

Finally, there is literature on the agreement of multiple states or stakeholders toward the development of a collaboration agreement, and harmonizing the state privacy laws and measures would be a vital component of the implementation of these [23]—our work does provide an analytical view of how the implementation of HIPAA across state barriers makes a difference in the effect of data breaches, and our analysis suggests that states with higher protection level than HIPAA are typically far better in terms of the effect any data breaches may have.

Creation of the Omnibus HIPAA Rule

On January 17, 2013, the HHS released the long-awaited “Omnibus Rule.” The Omnibus Rule implemented most of the privacy and security provisions of the Health Information Technology for Economic and Clinical Health Act. The rule made the following changes to the security and privacy of health data providers and health systems: (1) extended the reach and limits of HIPAA with respect to obligations to business associates and their subcontractors, (2) modified the breach notification standard and expanded patient rights to access and restrict disclosure of protected health information (PHI), (3) imposed new rules governing the uses and disclosures of PHI, (4) clarified enforcement approaches, and (5) addressed obligations under the Genetic Information Nondiscrimination Act of 2008.

Of these changes implemented by the HHS, rules 1-4 impact the security and privacy of user data stored on health care information systems and are expected to significantly improve it. This significant change enabled several covered entities (such as hospitals, partners, and clinics) to analyze gaps in their security practice and perform the following services: (1) revising privacy and security policies and procedures; (2) revising breach notification policies, procedures, and breach response plans; (3) amending notices of privacy practices (and making sure the revised notices are properly posted and distributed); (4) training the workforce and promoting more ongoing awareness about privacy and security policies; (5) revising business associate contract templates and process of amending or renegotiating each one within the framework of the Omnibus Rule; (6) determining whether any forms, such as requests for access, should be updated or created; (7) continuing—or making an increased effort—to take advantage of the safe harbor provision by encrypting PHI according to HHS’ guidance; and (8) making sure an updated risk analysis is in place and reflects vulnerabilities addressed in HHS guidance, such as mobile devices.


Ethical Considerations

Ethics approval is not required for this study, as human participants were not involved.

Study Design

First, we used data from HHS breaches and analyzed the severity of breach types and the impact of those breaches. Second, using secondary data and publicly available information, we tried to analyze whether data storage and retention changes to rules of HIPAA played any role in reducing security and privacy violations across the 50 US states. Finally, we used the textual data present in the vulnerability or breach data to analyze and recommend best practices for health care clinics and hospitals by doing a detailed qualitative analysis. We believe that hospital systems can alleviate the major concerns facing their health care systems overall.

The primary dataset used in this study was HHS breach report data from 2009 until January 2023 [4]. Using this dataset, the different types of data breaches were analyzed by analyzing their statistics. We further developed a model that studies the extent of the effect of a particular type of data breach and the size of such an effect on the user. We supplemented these data with data about 50 US states from the Report on Adoption of HIPAA from HealthInfoLaw.org. We analyzed 2 major events in our sample. First, we used a difference-in-differences analysis to examine the presence of state-specific health data storage rules that are more stringent than the current HIPAA regulations, in order to determine how states with only HIPAA compared to those with stricter rules. Second, we analyzed the impact of the Omnibus Rule change, in relation to state-level HIPAA stringency, on the overall number of customers. Further, based on our analysis of breach descriptions, we determined the severity of breach categories to determine the key security “values” that guide future security practices. The sequence of analyses performed in this paper is summarized in the research design flow diagram of Figure 1.

Figure 1. Research design flow. AI: artificial intelligence; HHS: Department of Health and Human Services; HIPAA: Health Insurance Portability and Accountability Act.

The final step was to perform a ground-up qualitative analysis of the breach descriptions provided in the dataset to classify distinct topics within the dataset. Each code in this analysis represents a portion of data that are tagged as relevant to one of several predetermined categories. Each category represents a specific aspect of data breach reports that helps organize the data to make it easier to understand patterns, correlations, and trends. The resulting categorization of the codes thus represents research themes that determine the key security “measures” that can lead to best practices for identifying and preventing future breaches.

With over 3000 data points in the dataset, we faced a potential research dilemma—performing a qualitative analysis on such a large dataset could potentially be time- and resource-intensive. To automate this process, we used ATLAS.ti, a well-known research coding tool that uses machine learning algorithms to analyze qualitative data and identify patterns and themes. Based on the information provided by ATLAS.ti, the system internally used ChatGPT 3.5 developed by OpenAI as the model to conduct fully automated inductive coding. The motivation to apply the technique instead of manual coding is that this process of semiautomated coding can save time and potentially improve the consistency of the codes since the dataset is too large to code manually. However, to ensure that the codes generated by the system are on par with human coding, one of the researchers manually coded a small subset (n=50) of the breach descriptions using NVivo (version 14; Lumivero), followed by performing the automated coding on the same dataset by ATLAS.ti. An interrater reliability analysis was performed on the resulting codes. The Cohen κ score for this analysis was 0.88, indicating a reliable coding performance from ATLAS.ti. We posited, then, that using ATLAS.ti for the qualitative analysis would be sufficient for the entire dataset. A complete comparison analysis is included in Multimedia Appendix 1.

To be more specific, the codes were created by ATLAS.ti using large language models from the GPT family with the foundation of vast amounts of different texts and additional training by the researchers. During the procedure, the system split the text from the dataset into smaller chunks and sent these data to the GPT models for repetition analysis. The results were then combined algorithmically to generate an optimal mix of codes including various topics while avoiding too many redundant codes.

Serving as the application of large language models, GPT is sensitive to the surrounding text as the context to have a window of attention that ensures that the size of the data does not overflow the model. Thus, the contexts generated are not greater than 100 characters long and are broken up at natural paragraph boundaries. During the coding process, the paragraphs that appear more than 1 time were excluded from the data as inputs. Next, the large language model separated out the context-specific codes and assigned them to a category based on “context,” “sentiment,” “meaning,” and such similar features, as documented in the GPT-4.


Summary of Data

Table 2 depicts the breach types that are common along with the type of incident shown. From this visualization, we can see that hacking or IT incidents are the types of breaches that have the highest impact in terms of the proportion of breaches. When considering the number of individuals affected, we see an even higher impact of hacking and IT-related incidents, which indicates hacking to be a continual issue in health care data privacy.

Table 2. Incidents and individuals by types of breaches.
Type of breachIncidents (n=5158), n (%)Individuals affected (n=382,533,378), n (%)
Hacking or IT incident2465 (47.7)316,771,372 (82.8)
Unauthorized access or disclosure1268 (24.5)24,074,273 (6.2)
Theft999 (19.3)26,876,573 (7)
Loss220 (4.2)9,449,646 (2.4)
Improper disposal110 (2.1)2,093,033 (0.5)
Other84 (1.6)1,188,272 (0.3)
Unknown12 (0.2)2,080,209 (0.5)

Is HIPAA Implementation Alone Sufficient to Reduce Data Breaches?

We proposed a model with statewise fixed effects to analyze the role of the type of incidents and the location of the incident on the economic value of the affected party. We then used the number of affected individuals as the dependent variable indicating the economic effect of the breaches. Further, we used the health classification of states as either being HIPAA compliant or having local laws that are more stringent than HIPAA, which affect the number of individuals affected by the breach. The following equation specifies the model:

ln(Individuals affected) = α + β1-5 Type of breach indicator + β6-9 C.E. type + β10-60 State indicator + β61 StHIPAA

Table 3 contains 3 primary models, model 1, model 2, and model 3, which incrementally add variables (Multimedia Appendix 2). Model 1 is the baseline model. Model 2 adds additional covariates of health care provider, health care clearinghouse, and health plan. Model 3 includes the indicator stronger than HIPAA variable, which indicates whether the corresponding state-enabled rules are stronger than HIPAA.

Table 3. Regression models display the effect of the health care breach type on individuals affecteda.
Dependent variable=ln(Individuals affected)Model 1Model 2Model 3

βP valueβP valueβP value
Hacking or IT incidentIncludedbIncludedIncluded
Improper disposal–1.162c<.001–1.176c<.001–1.176c<.001
Loss–1.342c<.001–1.339c<.001–1.339c<.001
Other–1.014c<.001–1.085c<.001–1.085c<.001
Theft–1.168c<.001–1.218c<.001–1.218c<.001
Unauthorized access or disclosure–1.336c<.001–1.362c<.001–1.362c<.001
Unknown–1.249d.02–1.291d.02–1.291d.02
Business associateIncludedIncludedIncluded
Health plan–0.382c<.001–0.382c<.001
Health care clearing house–0.393.49–0.393.49
Health care provider–0.411c<.001–0.411c<.001
Stagewise fixed effectIncludedIncludedIncluded
StHIPAAe
1.271d.03
Constant9.144c<.0018.743c<.0018.743c<.001
Observations515851405140
R20.120.140.14

aBreach report is present in Multimedia Appendix 2.

bNot applicable.

cP<.001.

dP<.05.

eStHIPAA: stronger than Health Insurance Portability and Accountability Act.

From these results, we see that each of the separate types of vulnerability (ie, hacking or IT incident: β=9.144, improper disposal: β=–1.139, loss: β=–1.085, other: β=–1.218, theft: β=–1.362, and unauthorized access or disclosure: β=–1.291) significantly affect ln(Individuals affected). From these, we see that the hacking or IT incident affects the number of individuals affected the highest, followed by loss of data, improper disposal, other types of hacking incidents, and theft of data. Overall, while different types of vulnerabilities affect and influence data uniquely, it is essential to observe that hacking or IT incident, which is the baseline category, has the highest effect on the number of individuals affected.

Similarly, the states that have laws that are significantly more stringent than HIPAA seem to be affected more by these different types of vulnerabilities (ie, stronger than HIPAA: β=1.271). Our results indicate that the higher the number of hacking and related incidents, the higher the chances for individuals being affected, and as a result, the most we need to protect against those types of attacks.

Effect of the Omnibus Rule Amendment to HIPAA on Breaches Across US States

The 2013 Omnibus Rule offers an opportunity to examine how the changes implemented on January 17, 2013—captured by a variable where time=0 represents the pre hoc period and time=1 represents the post hoc period—affect the number of individuals impacted in both the treated states (ie, states with regulations stronger than HIPAA) and states adhering solely to HIPAA standards. Building upon models 1, 2, and 3, we use a difference-in-differences model to estimate how the “Omnibus” Rule affected ln(Individuals affected) in both the treatment and control groups. Our difference-in-differences econometric estimation is described in Table 4.

Table 4. The result of the difference-in-differences estimation.

Model 1P valuea
Hacking or IT incidentIncludedb
Improper disposal–1.170c<.001
Loss–1.330c<.001
Other–1.074c<.001
Theft–1.205c<.001
Unauthorized access or disclosure–1.361c<.001
Unknown–1.267d.02
Business associateIncluded
Health plan–0.382c<.001
Health care clearinghouse–0.388.50
Health care provider–0.412c<.001
Treated time (difference-in-differences effect)0.0828.50
Constant8.741c<.001
Observations5140
R20.14

aTwo-tailed t test.

bNot applicable.

From our analysis, we observe that the overall difference-in-differences trend is not significant (coefficient=0.0828; P=.50). This demonstrates that despite laws being stronger than HIPAA in several states and the Omnibus Rule being issued, there are no guarantees that there will be a decrease overall, showing that despite additional guidelines and strengthening of protections, the number of individuals affected and breach trends continue to increase overall. Therefore, we can conclude that although HIPAA, state-specific stringent security rules, and Omnibus Rules provide guidelines, they are not sufficient on their own to prevent data breaches. Separate hospital-specific and breach-specific guidelines must also be followed.

Qualitative Analysis Results

We performed a qualitative coding procedure on the description of each of the 4000+ data points using the artificial intelligence (AI)–assisted coding process. This method produces a substantial number of codes and likely more than what is perceived as useful data. To solve the problem, we used embeddings, a feature of language models for all the words or phrases that correspond to a point within multidimensional space. Using this technique, initially, similar words or phrases were clustered together. The system then repeatedly combined codes nearest to each other into a collection as clusters until an expected number of collections are achieved. For enhanced rigor, we developed and analyzed clusters of 9, 10, 11, 12, and 15 separate collections and manually examined the unique level 2 codes belonging to each collection for similarity and overlap. Two authors (HS and YX) separately analyzed the collections of codes and found that the 15 chosen categories had the lowest overlap and similarity among the choices above. We finalized 15 chosen categories, which are displayed in Table 5.

Table 5. Final set of categories with their weights from the coding analysis.
Type of breachWeight (n=8517), n (%)
Data breach2533 (30)
Security1350 (16)
Privacy1292 (15)
Protected health information726 (9)
Communication632 (7)
Regulatory compliance355 (4)
Security breach355 (4)
Risk management305 (4)
Data privacy234 (3)
Employee management192 (2)
Access controls177 (2)
IT136 (2)
Policies121 (1)
Procedures71 (1)
Electronic communication38 (0)

Table 5 shows the distribution of the generated codes in 15 categories representing the cluster of similar codes obtained from the analysis. From these results, we observed that the combination of data breach, security, and privacy accounts for more than 60% of the breach reports’ description, validating our original quantitative results.

Figure 2 shows screen captures illustrating the process of category generation as embeddings in the ATLAS.ti user interface. Specifically, the larger neon green circles represent the categories, while the smaller green dots connected to them represent the relevant codes with similar characteristics.

Figure 2. (A) Generated codes and clusters and (B) the list of codes and categories generated.

We thus see 895 different codes created within the set of 15 categories. These categories correspond to the 15 underlying values based on the description of the breach report in the dataset: access controls, communication, data breach, data privacy, electronic communication, employee management, IT, PHI, policies, privacy, procedures, regulatory compliance, risk management, security, and security breach. By mapping these values onto their respective best practices as recommendations, we listed the definition of each core security-breach value as well as how organizations use these recommendations as exemplars in Multimedia Appendix 3 [24-85].

Based on the AI-generated summary from ATLAS.ti from the dataset in the health care industry, we find that the health care industry has faced numerous breaches of PHI, affecting a range of organizations such as hospitals, dental offices, insurance companies, and medical clinics. As a result, these breaches have led to unauthorized access, theft, and disclosure of sensitive personal and medical information through various means, including stolen laptops and physical documents, email errors, employee misconduct, and improper disposal of documents. In response to these incidents, investigations have been conducted by the Office for Civil Rights (OCR), and fines were imposed. Corrective actions have included enhancing data security measures, implementing encryption, conducting risk analyses, and providing breach notifications and credit monitoring to affected individuals. These breaches underscore the critical importance of safeguarding patient data, complying with HIPAA regulations, and continuously strengthening security protocols in the health care sector to prevent future incidents.


Overview

Based on our quantitative and qualitative analyses of the breach data, we now discuss a further theoretical contribution of our paper that we call SecureSphere, a structured framework for health care security, based on the security values derived earlier.

The SecureSphere Framework for Health Care Data System Security

The final step in our research is to classify the most important values that prevent large value data breaches overall and present the SecureSphere framework (Figure 3). The SecureSphere framework recommends a specific scope of action for the key security “values” and generic actions for preventing and sustaining data system security at hospitals and other health institutions that store, retrieve, and manage PHI.

Figure 3. SecureSphere framework for Hospital Data Breach Protection. The inner circle represents the core values that guide and represent 80% of the breaches. The outer circle represents the peripheral values that form key business practices that influence the inner circle. PHI: protected health information.

We represent values in concentric circles. The innermost circle represents the core values that include employee management, policy, procedures, and IT. The outer circle represents peripheral values associated with each core value. Thus, the framework demonstrates how data breach and PHI influence policy, security, and regulatory compliance influence procedures within the hospital. Then, we have access control and risk management that influence IT procedures within a company. Finally, we have email communication, general communication, and data handling (privacy), which influence employee management.

While the core focal values are essential focus areas of health care companies, the outer values form the essential components within these focus areas. The SecureSphere framework identifies key security values and categorizes them into concentric circles to emphasize their influence on hospital data system security. The best practices by value category are summarized in Textboxes 1-3.

Textbox 1. Core focal values (inner circle).

Employee management

  • Training and awareness: Regular training programs to educate employees on security protocols and best practices.
  • Access control: Implementing strict access controls to ensure that only authorized personnel can access sensitive data.
  • Monitoring and auditing: Continuous monitoring of employee activities and regular audits to detect and prevent unauthorized actions.

Policy

  • Comprehensive security policies: Developing clear and comprehensive security policies that outline acceptable use, data protection, and incident response.
  • Policy enforcement: Ensuring strict enforcement of security policies through regular checks and penalties for noncompliance.
  • Policy review and update: Regularly reviewing and updating policies to adapt to new threats and regulatory changes.

Procedures

  • Standard operating procedures (SOPs): Creating detailed SOPs for handling data, responding to incidents, and managing IT infrastructure.
  • Incident response procedures: Establishing clear procedures for responding to security incidents, including containment, investigation, and remediation.
  • Regular audits: Conducting regular audits to ensure adherence to established procedures and identify areas for improvement.

IT

  • IT infrastructure security: Implementing robust security measures for IT infrastructure, including firewalls, intrusion detection systems, and antivirus software.
  • System hardening: Regularly updating and patching systems to protect against vulnerabilities.
  • Incident response: Establishing an incident response team to quickly address and mitigate security breaches.
Textbox 2. Peripheral values (outer circle).

Data breach and protected health information (PHI)

  • Data encryption: Encrypting sensitive data to protect it from unauthorized access during transmission and storage.
  • Data minimization: Collecting only the minimum necessary data to reduce the risk of breaches.
  • PHI handling: Ensuring that PHI is handled in compliance with regulations such as HIPAA (Health Insurance Portability and Accountability Act).

Regulatory compliance

  • Compliance monitoring: Regularly monitoring compliance with regulations such as HIPAA, general data protection regulation, and others.
  • Compliance training: Providing ongoing training to employees on regulatory requirements and compliance practices.
  • Reporting and documentation: Maintaining thorough documentation and reporting mechanisms to demonstrate compliance.

Security

  • Layered security approach: Implementing multiple layers of security controls to protect data at various levels.
  • Risk assessments: Conducting regular risk assessments to identify and mitigate potential security threats.
  • Security best practices: Adopting industry best practices for securing networks, systems, and data.

Procedures (influenced by policy, security, and regulatory compliance)

  • Regular procedure updates: Continuously updating procedures to reflect changes in policy, security requirements, and regulatory standards.
  • Procedure training: Ensuring all employees are trained on the latest procedures and understand their roles in maintaining security.
Textbox 3. Additional influences.

Access control and risk management (influencing IT procedures)

  • Role-based access control (RBAC): Implementing RBAC to ensure users have access only to the information necessary for their role.
  • Risk management strategies: Developing and implementing strategies to identify, assess, and mitigate risks.

Email communication, general communication, and data handling (influencing employee management)

  • Secure email practices: Using encryption and secure email gateways to protect communication.
  • Communication policies: Establishing clear policies for secure communication, both within and outside the organization.
  • Data handling best practices: Implementing best practices for data handling, including secure storage, transmission, and disposal.

By following these best practices, hospitals can effectively enhance their data system security, minimize the risk of breaches, and ensure compliance with relevant regulations.

Conclusions

This paper uses the HIPAA privacy and security rules and analyzes various types of breaches in the US health care system. Though HIPAA rules are stringent, they are not sufficient to prevent some of the basic types of vulnerabilities that influence and affect the major players overall. Our comprehensive analysis of the HIPAA privacy and security rules in conjunction with a detailed study of various types of breaches within the US health care system reveals a complex landscape. Despite the robust framework provided by HIPAA and subsequent amendments like the Omnibus Rule, breaches continue to occur with alarming frequency and impact. The persistence of these breaches underscores the necessity for continuous reassessment and enhancement of security protocols.

Our empirical analysis highlights that while regulatory frameworks form a critical backbone for data protection, they must be dynamically updated and rigorously enforced to adapt to evolving technological landscapes and sophisticated cyber threats. The addition of stringent state laws appears to correlate with better outcomes in some cases, suggesting that a multilayered approach to regulation may be beneficial.

Moreover, our findings advocate for the importance of fostering a culture of security within health care organizations that transcends compliance. Investing in cutting-edge technologies, training staff on a continuous basis, and taking a proactive stance on security are imperative.

The results of our detailed qualitative analysis of all text data provide support for 15 core values related to security breach management. These categories include access controls, communication, data breach, data privacy, electronic communication, employee management, IT, PHI, policies, privacy, procedures, regulatory compliance, risk management, security, and security breach. For each category, specific definitions, best practice recommendations, and exemplary organizations are identified. For instance, data breach involves unintentional disclosures, with Mayo Clinic cited for best practices like ongoing employee training and encryption measures. Regulatory compliance emphasizes aligning with laws, showcased by Deloitte’s ethics programs and Ernst & Young’s compliance management. IT highlights reducing uncertainty in organizational processes, with Apple noted for developing AI tools. This structured approach aims to enhance understanding and application of security measures in response to the frequent and varied breaches affecting health care entities.

Finally, it is evident that to truly safeguard patient data, collaboration across various stakeholders—including health care providers, patients, technology firms, and policy makers—is crucial. By integrating insights from this extensive analysis and categorizing values into the inner core and peripheral values, we present the SecureSphere framework for the health care industry, which can better protect itself against future breaches and ensure the integrity and privacy of sensitive health information. We highlight key issues with the framework that enables health care executives to make key decisions to enable better health care IT system security.

Conflicts of Interest

None declared.

Multimedia Appendix 1

Details about human–artificial intelligence intercoder reliability with subsample of the dataset.

DOCX File , 189 KB

Multimedia Appendix 2

Breach report.

XLS File (Microsoft Excel File), 5161 KB

Multimedia Appendix 3

Values for information security practices with exemplars.

DOCX File , 25 KB

  1. Health Insurance Portability and Accountability Act of 1996 (HIPAA). Centers for Disease Control and Prevention, Public Health Law. 2024. URL: https:/​/www.​cdc.gov/​phlp/​php/​resources/​health-insurance-portability-and-accountability-act-of-1996-hipaa.html?CDC_AAref_Val=https:/​/www.​cdc.gov/​phlp/​publications/​topic/​hipaa.​html [accessed 2024-10-10]
  2. Slutsman J, Kass N, McGready J, Wynia M. Health information, the HIPAA privacy rule, and health care: what do physicians think? Health Aff (Millwood). 2005;24(3):832-842. [CrossRef] [Medline]
  3. Mbonihankuye S, Nkunzimana A, Ndagijimana A. Healthcare data security technology: HIPAA compliance. Wirel Commun Mob Comput. 2019;2019:1-7. [FREE Full text] [CrossRef]
  4. Breach portal: notice to the secretary of HHS breach of unsecured protected health information. US Department of Health and Human Services, Office of Civil Rights. URL: https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf [accessed 2024-10-10]
  5. Americans overwhelmingly believe electronic personal health records could improve their health. Markle Foundation. 2008. URL: https:/​/www.​markle.org/​publications/​401-americans-overwhelmingly-believe-electronic-personal-health-records-could-improve-t/​ [accessed 2024-10-10]
  6. Keselman A, Slaughter L, Smith CA, Kim H, Divita G, Browne A, et al. Towards consumer-friendly PHRs: patients' experience with reviewing their health records. AMIA Annu Symp Proc. 2007;2007:399-403. [FREE Full text] [Medline]
  7. Kerns JW, Krist AH, Longo DR, Kuzel AJ, Woolf SH. How patients want to engage with their personal health record: a qualitative study. BMJ Open. 2013;3(7):e002931. [FREE Full text] [CrossRef] [Medline]
  8. Basil NN, Ambe S, Ekhator C, Fonkem E. Health records database and inherent security concerns: a review of the literature. Cureus. 2022;14(10):e30168. [FREE Full text] [CrossRef] [Medline]
  9. Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol Health Care. 2017;25(1):1-10. [CrossRef] [Medline]
  10. Bates DW, Saria S, Ohno-Machado L, Shah A, Escobar G. Big data in health care: using analytics to identify and manage high-risk and high-cost patients. Health Aff (Millwood). 2014;33(7):1123-1131. [CrossRef] [Medline]
  11. Kask M, Piho G, Ross P. Systematic literature review of methods for maintaining data integrity. In: Advances in Model and Data Engineering in the Digitalization Era MEDI 2021. Cham, Switzerland. Springer; 2021.
  12. Peddicord D, Waldo AB, Boutin M, Grande T, Gutierrez L. A proposal to protect privacy of health information while accelerating comparative effectiveness research. Health Aff (Millwood). 2010;29(11):2082-2090. [CrossRef] [Medline]
  13. Aldis W. Health security as a public health concept: a critical analysis. Health Policy Plan. 2008;23(6):369-375. [CrossRef] [Medline]
  14. Fernández-Alemán JL, Señor IC, Lozoya PAO, Toval A. Security and privacy in electronic health records: a systematic literature review. J Biomed Inform. 2013;46(3):541-562. [FREE Full text] [CrossRef] [Medline]
  15. Jahan S, Chowdhury M, Islam R, Gao J. Security and privacy protection for eHealth data. In: Future Network Systems and Security. 2018. Presented at: 4th International Conference on Future Network Systems and Security, FNSS 2018; July 9-11, 2018:197-205; Montparnasse, France. URL: https://researchoutput.csu.edu.au/en/publications/security-and-privacy-protection-for-ehealth-data [CrossRef]
  16. Vaishnav R, Panditi MDD, Dhiman V, Aarthy CCJ, Kumari YS, Mohiddin MK. Data security in healthcare management analysis and future prospects. Mater Today Proc. 2022;51:2202-2206. [CrossRef]
  17. Abouelmehdi K, Beni-Hessane A, Khaloufi H. Big healthcare data: preserving security and privacy. J Big Data. 2018;5(1):1-18. [CrossRef]
  18. Rezaeibagha F, Win KT, Susilo W. A systematic literature review on security and privacy of electronic health record systems: technical perspectives. Health Inf Manag. 2015;44(3):23-38. [CrossRef] [Medline]
  19. Tan E, Mahula S, Crompvoets J. Blockchain governance in the public sector: a conceptual framework for public management. Gov Inf Q. 2022;39(1):101625. [FREE Full text] [CrossRef]
  20. Cordella A, Bonina CM. A public value perspective for ICT enabled public sector reforms: a theoretical reflection. Gov Inf Q. 2012;29(4):512-520. [FREE Full text] [CrossRef]
  21. Mayer AH, da Costa CA, Righi RDR. Electronic health records in a blockchain: a systematic review. Health Informatics J. 2020;26(2):1273-1288. [CrossRef] [Medline]
  22. Kruse CS, Smith B, Vanderlinden H, Nealand A. Security techniques for the electronic health records. J Med Syst. 2017;41(8):127. [FREE Full text] [CrossRef] [Medline]
  23. Dimitropoulos L, Rizk S. A state-based approach to privacy and security for interoperable health information exchange. Health Aff (Millwood). 2009;28(2):428-434. [CrossRef] [Medline]
  24. Cheng L, Liu F, Yao DD. Enterprise data breach: causes, challenges, prevention, and future directions. WIREs Data Min Knowl Discov. 2017;7(5):e1211. [CrossRef]
  25. Avis E. Mayo Clinic's focus on staff needs, training and efficiency pays off. Health Facilities Management. 2022. URL: https:/​/www.​hfmmagazine.com/​articles/​4601-mayo-clinics-focus-on-staff-needs-training-and-efficiency-pays-off [accessed 2024-10-10]
  26. Loughlin S. In contracts with device vendors, Mayo Clinic emphasizes security. Biomed Instrum Technol. 2016;50(1):53-55. [CrossRef] [Medline]
  27. Privacy policy. Mayo Clinic. 2024. URL: https://www.mayoclinic.org/about-this-site/privacy-policy [accessed 2024-10-10]
  28. Rothchild E. What is security? Daedalus. 1995;124(3):53-98.
  29. We stop threats hiding in plain sight. Symantec. 2024. URL: https://sep.securitycloud.symantec.com/v2/landing [accessed 2024-10-10]
  30. Design zone for security. Cisco. 2024. URL: https:/​/www.​cisco.com/​c/​en/​us/​solutions/​enterprise/​design-zone-security/​index.​html#:~:text=The%20Cisco%20Design%20Zone%20for,defense%2C%20and%20other%20security%20architectures [accessed 2024-10-10]
  31. Infosec. 2024. URL: https://www.infosecinstitute.com/iq/welcome/ [accessed 2024-10-10]
  32. Solove DJ. Understanding Privacy. Cambridge, MA. Harvard University Press; 2010:272.
  33. Compliance guidance. US Department of Health and Human Services Office of Inspector General. 2023. URL: https://oig.hhs.gov/compliance/compliance-guidance/ [accessed 2024-10-10]
  34. Data privacy day at Apple: improving transparency and empowering users. Apple Newsroom. 2021. URL: https:/​/www.​apple.com/​bh/​newsroom/​2021/​01/​data-privacy-day-at-apple-improving-transparency-and-empowering-users/​ [accessed 2024-10-10]
  35. Martinez J. Facebook unveils privacy education feature for new users. The Hill. 2012. URL: https:/​/thehill.​com/​policy/​technology/​133497-facebook-unveils-privacy-education-feature-for-new-users/​ [accessed 2024-10-10]
  36. How Google anonymizes data. Google. URL: https://policies.google.com/technologies/anonymization?hl=en-US [accessed 2024-10-10]
  37. Isola S, Al Khalili Y. Protected Health Information. Treasure Island, FL. StatPearls Publishing; 2024.
  38. Security and privacy policies. Epic. 2023. URL: https://www.epic.com/privacypolicies/ [accessed 2024-10-10]
  39. McGee MK. Cleveland Clinic: assessing risks. ISMG Network. 2013. URL: https://www.healthcareinfosecurity.com/interviews/cleveland-clinic-assessing-risks-i-1820 [accessed 2024-10-10]
  40. Notice of privacy practices. US Department of Health and Human Services. 2023. URL: https://www.hhs.gov/hipaa/for-individuals/notice-privacy-practices/index.html [accessed 2024-10-10]
  41. Luhmann N. What is communication? Commun Theory. 1992;2(3):251-259. [FREE Full text] [CrossRef]
  42. Share without insecurity. Signal. URL: https://signal.org/#:~:text=State%2Dof%2Dthe%2Dart,%2C%20every%20call%2C%20every%20time [accessed 2024-10-10]
  43. How to give your team meetings a status update. Atlassian. 2016. URL: https://www.atlassian.com/blog/teamwork/give-team-meetings-status-update [accessed 2024-10-10]
  44. Learning more effective communication techniques for your communication style. LinkedIn Learning Blog. 2023. URL: https:/​/www.​linkedin.com/​business/​learning/​blog/​effective-communication-techniques-for-your-communication-style [accessed 2024-10-10]
  45. Kharbili ME, Ma Q, Kelsen P, Pulvermueller E. CoReL: policy-based and model-driven regulatory compliance management. IEEE; 2011. Presented at: 2011 IEEE 15th International Enterprise Distributed Object Computing Conference; August 29-September 2, 2011:247-256; Helsinki, Finland. [CrossRef]
  46. Ethics and compliance programs. Deloitte. URL: https://www2.deloitte.com/br/en/pages/risk/solutions/programas-de-etica-compliance.html [accessed 2024-10-10]
  47. EY regulatory compliance manager. EY. 2024. URL: https://www.ey.com/en_gl/services/consulting/regulatory-compliance-manager [accessed 2024-10-10]
  48. Internal audit, risk and compliance services. KPMG. 2024. URL: https:/​/kpmg.​com/​dp/​en/​home/​services/​advisory/​risk-consulting/​internal-audit-risk-compliance-services.​html#:~:text=KPMG's%20Internal%20audit%2C%20Risk%20%26%20compliance,supply%20chain%20to%20augment%20and [accessed 2024-10-10]
  49. Hovav A, Andoh-Baidoo F, Dhillion G. Classification of security breaches and their impact on the market value of firms. 2007. Presented at: Proceedings of the 6th Annual Security Conference; April 11-12, 2007; Las Vegas, NV. URL: https:/​/www.​researchgate.net/​profile/​Anat-Hovav/​publication/​267790166_Classification_of_Security_Breaches_and_Their_Impact_on_the_Market_Value_of_Firms/​links/​597637b8458515e26d25b3ef/​Classification-of-Security-Breaches-and-Their-Impact-on-the-Market-Value-of-Firms.​pdf
  50. Cyber incident response planning. IBM. 2021. URL: https://www.ibm.com/docs/en/ftmswsfz300?topic=program-cyber-incident-response-planning [accessed 2024-10-10]
  51. Maude MMJ. A post breach analysis: Okta support unit. BeyondTrust. 2024. URL: https://www.beyondtrust.com/webinars/a-post-breach-analysis-okta-support-unit [accessed 2024-10-10]
  52. Global data breach resolution. Experian. 2023. URL: https://www.experian.com/data-breach/solutions/global-data-breach-resolution [accessed 2024-10-10]
  53. Power M. The risk management of everything. J Risk Fin. 2004;5(3):58-65. [CrossRef]
  54. Enterprise Risk Management Initiative. NC State University. 2024. URL: https://erm.ncsu.edu/ [accessed 2024-10-10]
  55. Neelis M. A crisis communications plan for data breaches. PUSHKINPR Authentic Communication. URL: https://www.pushkinpr.com/blog/crisis-communications-plan-data-breaches/ [accessed 2024-10-10]
  56. Vimercati SDCD, Foresti S, Livraga G, Samarati P. Data privacy: definitions and techniques. Int J Unc Fuzz Knowl Based Syst. 2012;20(06):793-817. [CrossRef]
  57. Privacy and data management overview. Microsoft. 2024. URL: https://learn.microsoft.com/en-us/compliance/assurance/assurance-privacy [accessed 2024-10-10]
  58. Privacy governance. Apple. URL: https://www.apple.com/legal/privacy/en-ww/governance/ [accessed 2024-10-10]
  59. Creating trust through transparency. Google Privacy. URL: https://cloud.google.com/transparency [accessed 2024-10-10]
  60. Blount Y. Employee management and service provision: a conceptual framework. Inf Technol People. 2011;24(2):134-157. [CrossRef]
  61. Who we are shapes the work we do. Google Belonging. URL: https://about.google/belonging/at-work/ [accessed 2024-10-10]
  62. Training services—life is for learning, let's turn it into success. Siemens. URL: https:/​/www.​siemens.com/​global/​en/​products/​services/​digital-enterprise-services/​training-services.​html [accessed 2024-10-10]
  63. HR lessons from the Adobe performance management overhaul. Performyard. 2023. URL: https://www.performyard.com/articles/adobe-performance-management [accessed 2024-10-10]
  64. The small business guide to internal communication. Salesforce. 2024. URL: https://www.salesforce.com/resources/articles/small-business-guide-internal-communication/ [accessed 2024-10-10]
  65. Bhayani T. Crafting culture: insights from the Patagonia employee handbook for your business. AirMason. 2024. URL: https:/​/blog.​airmason.com/​patagonia-employee-handbook-pdf/​#:~:text=Patagonia%20champions%20employee%20empowerment%20and,special%20benefits%20for%20breastfeeding%20mothers [accessed 2024-10-10]
  66. Sandhu RS, Samarati P. Access control: principle and practice. IEEE Commun Mag. 1994;32(9):40-48. [CrossRef]
  67. Microsoft Entra multifactor authentication (MFA). Microsoft. URL: https:/​/www.​microsoft.com/​en-us/​security/​business/​identity-access/​microsoft-entra-mfa-multi-factor-authentication [accessed 2024-10-10]
  68. Control access to AWS resources using policies. Amazon Web Services. URL: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_controlling.html [accessed 2024-10-10]
  69. What is role-based access control (RBAC)? Okta. 2024. URL: https:/​/www.​okta.com/​identity-101/​what-is-role-based-access-control-rbac/​#:~:text=Role%2Dbased%20access%20control%20(RBAC)%20systems%20assign%20access%20and,different%20roles%20have%20different%20rights [accessed 2024-10-10]
  70. Dewett T, Jones GR. The role of information technology in the organization: a review, model, and assessment. J Manage. 2001;27(3):313-346. [CrossRef]
  71. Introducing Apple's on-device and server foundation models. Apple Machine Learning Research. 2024. URL: https://machinelearning.apple.com/research/introducing-apple-foundation-models [accessed 2024-10-10]
  72. Best practices implementing zero trust with Palo Alto Networks. paloaltoTECHDOCS. 2024. URL: https:/​/docs.​paloaltonetworks.com/​best-practices/​zero-trust-best-practices/​zero-trust-best-practices/​the-five-step-methodology/​step-1-asset-discovery-and-prioritization [accessed 2024-10-10]
  73. AWS plans to invest 2.26 trillion yen into its Japanese cloud infrastructure by 2027. Amazon Web Services. 2024. URL: https:/​/press.​aboutamazon.com/​aws/​2024/​1/​aws-plans-to-invest-2-26-trillion-yen-into-its-japanese-cloud-infrastructure-by-2027 [accessed 2024-10-10]
  74. von Solms R, von Solms B. From policies to culture. Comput Secur. 2004;23(4):275-279. [FREE Full text] [CrossRef]
  75. Providing a safe and trusted experience for everyone. GooglePlay. URL: https://play.google/developer-content-policy/ [accessed 2024-10-10]
  76. Modifying a policy. IBM. 2023. URL: https://www.ibm.com/docs/en/data-risk-manager/2.0.6?topic=policies-modifying-policy [accessed 2024-10-10]
  77. Fenton E. Salesforce subprocessors: understanding key vendors and their roles. visualping; 2024. URL: https://visualping.io/blog/salesforce-subprocessors [accessed 2024-10-10]
  78. Bandor MS. Process and procedure definition: a primer. Software Engineering Institute. 2007. URL: https://insights.sei.cmu.edu/documents/3263/2007_017_001_23937.pdf [accessed 2024-10-10]
  79. Updating system software by using Enterprise Class services. IBM. 2024. URL: https:/​/www.​ibm.com/​docs/​en/​flashsystem-9x00/​8.​4.​x?topic=uss-updating-system-software-by-using-enterprise-class-services [accessed 2024-10-10]
  80. Our global impact—sustainability/ESG. 3M. 2024. URL: https://www.3m.com/3M/en_US/sustainability-us/governance/innovation-management/ [accessed 2024-10-10]
  81. Procedures. Google developer documentation style guide. 2024. URL: https://developers.google.com/style/procedures [accessed 2024-10-10]
  82. van der Kam WJ, Moorman PW, Koppejan-Mulder MJ. Effects of electronic communication in general practice. Int J Med Inform. 2000;60(1):59-70. [CrossRef] [Medline]
  83. Slack communication: enhancing collaboration and efficiency in the workplace. Cerkl. 2024. URL: https://cerkl.com/blog/slack-communication/ [accessed 2024-10-10]
  84. Safeguard individual privacy with cloud services from Microsoft. Microsoft. URL: https://www.microsoft.com/en-us/trust-center/privacy/gdpr-overview#GDPR [accessed 2024-10-10]
  85. The best ways to secure communication channels in the enterprise environment. Cybersecurity Insiders. URL: https:/​/www.​cybersecurity-insiders.com/​the-best-ways-to-secure-communication-channels-in-the-enterprise-environment/​ [accessed 2024-10-10]


AI: artificial intelligence
EHR: electronic health record
HHS: Department of Health and Human Services
HIPAA: Health Insurance Portability and Accountability Act
PHI: protected health information
PHR: personal health record


Edited by G Eysenbach, T de Azevedo Cardoso; submitted 18.04.24; peer-reviewed by S Velichety, L Zhou; comments to author 28.05.24; revised version received 29.07.24; accepted 15.09.24; published 06.11.24.

Copyright

©Hemang Subramanian, Arijit Sengupta, Yilin Xu. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 06.11.2024.

This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.