[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Privacy preservation and information security protection for patients' portable electronic health records

Published: 01 September 2009 Publication History

Abstract

As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.

References

[1]
Code of Federal Regulations (US), Title 45, Part 164, 2002.
[2]
Sadan, B., Patient data confidentiality and patient rights. Int. J. Med. Inf. v62. 41-49.
[3]
Fowles, J.B., Kind, A.C., Craft, C., Kind, E.A., Mandel, J.L. and Adlis, S., Patients' interest in reading their medical record: relation with clinical and sociodemographic characteristics and patients' approach to health care. Arch. Intern. Med. v164. 793-800.
[4]
A.K. Abdullah, Protecting your good name: identity theft and its prevention, in: Proceedings of the First Annual Conference on Information Security Curriculum Development, Kennesaw, Georgia, October 2004, pp. 102-106.
[5]
Yang, C.M., Lin, H.C., Chang, P. and Jian, W.S., Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA. Comput. Meth. Prog. Bio. v82. 277-282.
[6]
I.L. Horowitz, Privacy, publicity and security: the American context: privacy is not only a right but also an obligation, EMBO Report, vol. 7 (SI) 2006, pp. S40-S44.
[7]
Hassol, A., Walker, J.M., Kidder, D., Rokita, K., Young, D., Pierdon, S., Deitz, D., Kuck, S. and Ortiz, E., Patient experiences and attitudes about access to a patient electronic health care record and linked web messaging. J. Am. Med. Inform. Assoc. v11. 505-513.
[8]
Barrows Jr., R.C. and Clayton, P.D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. v3. 139-148.
[9]
Serour, G.I., Confidentiality, privacy and security of patients' health care information: FIGO Committee for the Ethical Aspects of Human Reproduction and Women's Health. Int. J. Gynecol. Obstet. v93. 184-186.
[10]
Ball, E., Chadwick, D.W. and Mundy, D., Patient privacy in electronic prescription transfer. IEEE Security & Privacy. v1. 77-80.
[11]
Mandl, K.D., Szolovits, P. and Kohane, I.S., Public standards and patients' control: how to keep electronic medical records accessible but private. Brit. Med. J. v322. 283-287.
[12]
Mandl, K.D., Simons, W.W., Crawford, W.C.R. and Abbett, J.M., Indivo: a personally controlled health record for health information exchange and communication. BMC Med. Inform. Decis. Making. v7. 25
[13]
Gritzalis, S., Lambrinoudakis, C., Lekkas, D. and Deftereos, S., Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inf. Technol. Biomed. v9. 413-423.
[14]
Liu, C.T., Yang, P.T., Yeh, Y.T. and Wang, B.L., The impacts of smart cards on hospital information systems-an investigation of the first phase of the national health insurance smart card project in Taiwan. Int. J. Med. Inf. v75. 173-181.
[15]
Kim, M.I. and Johnson, K.B., Personal health records: evaluation of functionality and utility. J. Am. Med. Inform. Assoc. v9. 171-180.
[16]
Churches, T., A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers. BMC Med. Res. Methodol. v3. 1
[17]
Car, J. and Sheikh, A., Email consultations in health care: 1-scope and effectiveness. Brit. Med. J. v329. 435-438.
[18]
Car, J. and Sheikh, A., Email consultations in health care: 2-acceptability and safe application. Brit. Med. J. v329. 439-442.
[19]
Gobuty, D.E., Leetz, W., Horn, R.J. and Moehrke, J.F., Allocating basic security rules for use in medical imaging information technology. Acad. Radiol. v11. 779-786.
[20]
Meux, E., Encrypting personal identifiers. Health Serv. Res. v29. 247-256.
[21]
Szolovits, P. and Kohane, I., Against simple universal health-care identifiers. J. Am. Med. Inform. Assoc. v1. 316-319.
[22]
Agrawal, R. and Johnson, C., Securing electronic health records without impeding the flow of information. Int. J. Med. Inf. v76. 471-479.
[23]
Miller, R., Boitnott, J.K. and Moore, G.W., Web-based free-text query system for surgical pathology reports with automatic case deidentification. Arch. Pathol. Lab. Med. v125. 1011
[24]
Berman, J.J., Concept-match medical data scrubbing: how pathology text can be used in research. Arch. Pathol. Lab. Med. v127. 680-686.
[25]
Douglass, M., Clifford, G.D., Reisner, A., Moody, G.B. and Mark, R.G., Computer-assisted de-identification of free text in the MIMIC II database. Comput. Cardiol. v31. 341-344.
[26]
Gupta, D., Saul, M. and Gilbertson, J., Evaluation of a deidentification (De-Id) software engine to share pathology reports and clinical documents for research. Am. J. Clin. Pathol. v121. 176-186.
[27]
Beckwith, B.A., Mahaadevan, R., Balis, U.J. and Kuo, F., Development and evaluation of an open source software tool for deidentification of pathology reports. BMC Med. Inform. Decis. Making. v6. 12
[28]
H. Müller, J. Heuberger, A. Geissbuhler, Logo and text removal for medical image retrieval, in: German Workshop on Medical Image Retrieval (BVM), Springer Informatik Aktuell, Heidelberg, 2005.
[29]
Newton, E.M., Sweeney, L. and Malin, B., Preserving privacy by de-identifying facial images. IEEE Trans. Knowl. Data Eng. v17. 232-243.
[30]
K. Pommerening, M. Reng, Secondary use of the electronic health record via pseudonymisation, Medical and Care Compunetics 1, Studies in Health Technology and Informatics, vol. 103, IOS Press, Amsterdam, The Netherlands, 2004, pp. 441-446.
[31]
Noumeir, R., Lemay, A. and Lina, J.M., Pseudonymisation of radiology data for research purposes. Proc. SPIE. v5748. 298-305.
[32]
D. Appleman, Regular expressions with NET, Desaware Inc., {http://www.desaware.com}, 2002.
[33]
Watt, A., Beginning Regular Expressions (Programmer to Programmer). 2005. Wrox Press, Wiley, Indianapolis, IN.
[34]
American College of Radiology, National Electrical Manufacturers Association, ACR-NEMA Digital Imaging and Communications Standard: DICOM 2008 Part 15 Security Profiles, NEMA, Rosslyn, VA, USA.
[35]
Weiss, N., E-mail consultation: clinical, financial, legal, and ethical implications. Surg. Neurol. v61. 455-459.
[36]
ASTM International (ASTM), ASTM E2369-05 Standard Specification for Continuity of Care Record (CCR).

Cited By

View all
  • (2022)Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health RecordsSecurity and Communication Networks10.1155/2022/19537232022Online publication date: 1-Jan-2022
  • (2021)Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunitiesCluster Computing10.1007/s10586-020-03106-124:1(293-317)Online publication date: 1-Mar-2021
  • (2021)RETRACTED ARTICLE: Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseasesSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-021-05866-325:18(12159-12174)Online publication date: 1-Sep-2021
  • Show More Cited By
  1. Privacy preservation and information security protection for patients' portable electronic health records

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Computers in Biology and Medicine
        Computers in Biology and Medicine  Volume 39, Issue 9
        September, 2009
        110 pages

        Publisher

        Pergamon Press, Inc.

        United States

        Publication History

        Published: 01 September 2009

        Author Tags

        1. De-identification
        2. Portable electronic health record
        3. Privacy
        4. Security

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 26 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health RecordsSecurity and Communication Networks10.1155/2022/19537232022Online publication date: 1-Jan-2022
        • (2021)Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunitiesCluster Computing10.1007/s10586-020-03106-124:1(293-317)Online publication date: 1-Mar-2021
        • (2021)RETRACTED ARTICLE: Cloud- and IoT-based deep learning technique-incorporated secured health monitoring system for dead diseasesSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-021-05866-325:18(12159-12174)Online publication date: 1-Sep-2021
        • (2018)Automatic Cataract Diagnosis by Image-Based Interpretability2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC.2018.00672(3964-3969)Online publication date: 7-Oct-2018
        • (2017)Health privacy as sociotechnical capitalComputers in Human Behavior10.1016/j.chb.2017.07.02576:C(227-236)Online publication date: 1-Nov-2017
        • (2017)A De-Identification Pipeline for Ultrasound Medical Images in DICOM FormatJournal of Medical Systems10.1007/s10916-017-0736-141:5(1-16)Online publication date: 1-May-2017
        • (2017)New secure healthcare system using cloud of thingsCluster Computing10.1007/s10586-017-0872-x20:3(2211-2229)Online publication date: 1-Sep-2017
        • (2016)Security and privacy preserving approaches in the eHealth clouds with disaster recovery planComputers in Biology and Medicine10.1016/j.compbiomed.2016.09.00378:C(1-8)Online publication date: 1-Nov-2016
        • (2016)Challenges in Managing Real-Time Data in Health Information System HISProceedings of the 14th International Conference on Inclusive Smart Cities and Digital Health - Volume 967710.1007/978-3-319-39601-9_27(305-313)Online publication date: 25-May-2016
        • (2016)Consent-based access control for secure and privacy-preserving health information exchangeSecurity and Communication Networks10.1002/sec.15569:16(3496-3508)Online publication date: 10-Nov-2016
        • Show More Cited By

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media