You are on page 1of 15

SECURITY ISSUES IN CLINICAL INFORMATICS

Arunkumar Reddy Marepally Chris Imafidon


easypatientrecords@gmail.com chris12@uel.ac.uk
School of Computing, Information School of Computing, Information
Technology and Engineering Technology and Engineering
University of East London, University of East London,
Docklands Campus, University Way, Docklands Campus, University Way,
London E16 2RD London E16 2RD
Formerly, Head of Management of
Technology Unit, Queen Mary, University of
London.
Guest Seminar Lecturer at University of
Cambridge.
Guest Lecturer at University of Oxford.

ACKNOWLEDGEMENTS
Professor Dr. Kaori Sasaki, Imperial College, “Public Understanding of Computer Databases
in Health Care”.
University of Cambridge for the Security Seminar Series held at Cambridge.
Wellcome Trust for helpful information on informatics.

makes decisions based on runtime


KEYWORDS: parameters and not on just role of the user,
Informatics, Clinical Informatics, Multi Factor Authentication – more than
Electronic Patient Records, Technology, two types of authentication procedures
Security Issues, Privacy, Authentication, should be made mandatory to the staff,
Information Blocking Mechanisms. healthcare providers and companies to
actually view a patient’s health
ABSTRACT information and Access Control
The role of Informatics in Clinical mechanisms – which enables
Institutions, Health Organisations and administrators to actually filter the
Hospitals have been towards impressive authorization permissions of the user.
growth in adopting Technologies which This paper reports on the Security
help in making clinical decisions, improve Issues related to privacy of the data and
care, implementing health information implementing privacy maintaining settings
systems and clinical management. like authentication and blocking of the
Internet, Technologies, Software information according to the patient’s
implementations are few terminologies point of view are introduced. These
which describe the health organisations in Privacy Blocking and Authentication
the present conditions. Transforming the settings are introduced in
paper based medical records to electronic Easypatientrecords which is exclusively
was an earlier task and now transforming designed to help understand the need for
the Electronic Patient Records into privacy control and will be very helpful
divisions like summary and detailed for Summary Care Records. The reason
records are new in Health organisations in NHS and National Programme for IT
NHS. (NPfIT) should consider and implement
As Internet is the major source of these in Summary Care Records is because
communication and interaction between the SCR is accessible by clinical staff,
physicians, patients and healthcare emergency staff and also by the patient.
providers the data or the information The present SCR is missing the privacy
stored is not private. More deliberation locks and authentication (password
should be towards Security requirements recognition page) which are introduced
such as Dynamic Authorization – this step through this paper.

1
was rare to find a computer on a
physicians desk. But now with the
increase of information about patient
1. INTRODUCTION electronically the use of computer is
The creation and usage of Electronic beyond just storing or retrieving
Patient Record System in any health information. Computers are used beyond
organisations will bring new benefits and analysing and reporting of data but the
helps in increasing the efficiency of the systems can create automated surveillance
quality of care to the patients. The for health infections. [Diekema, 2010]
improvement in cost effectiveness, error
reduction and wastage of data depends on Informatics deals with problem solving in
how good the Software is installed and many major areas and also acts as a
how effectively the people using these medium between IT and many other
systems have knowledge about the modes of studies like Biology, arts,
Information Technology, because a telecommunications. Each mode then
genuine Electronic Patient Record system transforms and leads to bio informatics,
can deliver better prospects to the patient. arts leading to development of multimedia
The present Electronic Patient animations and web designing and so on.
Record service in NHS is called the NHS Solving a problem is made easy in any
Care Record Service which is the plan of field when computing is involved because
National Programme for IT in England. computing gives the foundation for
These Electronic Patient Records are in science, business industries and better
existence since long time and new prospects to the society. [MacKie-Mason
implementations like NCRS is the 2010]
expansion of electronic patient data,
information about GP, health tips and Informatics utilises information
adding new software and replacing new technology practically to any field, while
hardware. The major creation of Detailed considering its consequences on
Care Records came into existence and individuals, organizations and society.
later divided as Summary Care Records Informatics uses computational techniques
for emergency purposes. as a tool to solve problems in other fields,
Security and Privacy are the major to communicate and to express new
drawback when dealing with information innovative ideas. [Dennis Groth 2010]
on web. Detailed explanations of Security
Issues, Authentication in Healthcare and The Figure 1 below gives a basic idea
Accessing control are the major points that about how a problem is solved by
are discussed here in the paper. analysing the systems and how humans
This paper explores about interact with them. The seven steps
Technologies adopted by NHS such as involved here not only investigate but also
Websites, Search engines, Telemedicine improves the data. [Hughes 2007]
and Mail Services; apart from the
technologies the paper also includes
information about Security, Privacy,
Access Control, Confidentiality and
implementation of Authentication
Mechanisms such as Privacy blocking
Settings that are similar to Social
Networking Privacy Settings.

2. INFORMATICS
Computers have become Universal in
every possible offices, which includes the
healthcare organisations and Hospitals. In
Fig1: 7 Steps in Soft Systems
the past or may be even few years ago it
Methodology. [Hughes, 2007]

2
communicate with the health
services and to connect people.
2.1 CLINICAL INFORMATICS  To use the new innovations and
Clinical Informatics has been described as emerging technologies and the
a field that meets two mutually related but design of the systems should be
which has distinct needs [Hersh, 2002], more understandable and
Patient-centric and Knowledge-centric transform the existing
[Sarkar, 2010]. The innovations in Clinical technologies.
Informatics are needed to improve  Increasing convenience to use the
patient’s healthcare through basic concepts technologies.
like availability and integration of  Clinical Informatics plans to
information at the time of care [Costa, integrate planning and
Fitzgerald, et al 2009] performance. [1] [Department of
Health Informatics is defined as the Health]
knowledge, skills and tools which
facilitate information to be collected, 3. TECHNOLOGY
managed, used and shared to support in Technology in healthcare industry has a
delivering the healthcare and promoting major impact on physicians, practitioners
health. [Department of Health, 2010] as they deal with IT systems not only for
Clinical Informatics have the administrative use and clinical purposes
potential to transform the health care by but also major surgeries which involves
implementing, designing and evaluating highest level of computerisation skills.
the information and communicating One of the simple uses of technology is to
systems that improves patient care and convert the paper based record of a patient
helps in strengthen the Physician-Patient into electronic data and also scanning
relationship. Clinical Informatics deals older notes, prescriptions into electronic
with clinical information and information. [Bates, 2002]
understanding of informatics concepts,
procedures and tools to assess information,
evaluate and refine clinical processes,
3.1 TECHNOLOGY IN
develop, implement clinical systems, HEALTHCARE
participate in management and continuous Technology is one source through which
improvement of clinical information the healthcare organisations can improve
systems. [Gardner 2009] efficiency, improve patient’s safety and
other benefits, but also can create hazard if
the clinical staff are not trained. [Wildt,
Verzijden, et al, 2007] [Murphy, Bjartell,
2.2 FUTURE OF CLINICAL et al, 2009]
INFORMATICS IN NHS -
QUALITY, INNOVATION, 3.1.1 NPfIT: NATIONAL
PRODUCTIVITY AND PROGRAMME FOR
PREVENTION (QIPP) INFORMATION TECHNOLOGY
According to the Clinical Informatics
Department of Health published a report
plans in near future 2010-2011 NHS has
called Delivering 21st century IT support
some priorities of Quality, Innovation,
for NHS: National strategic programme,
Productivity and Prevention (QIPP) and
which in turn is a prototype for National
are related
Programme for Information Technology
 To support the permissions of (NPfIT). [Department of Health, 2002]
patients and physicians, to [2]
motivate developments in health Department of Health initiated National
services and to increase the programme for IT to provide secure
productivity, the main focus is on electronic patient records in primary and
making use of the technologies secondary care. It also integrates different
which will help the patient to kinds of systems like prescription service

3
software, appointment software and many The Summary Care Records is a service
more to health sectors. It is estimated introduced to ensure that all the NHS
approximately around £12.4 billion for 10 patients health information is recorded
years till 2014. [Department of Health, electronically and only the summery of a
2002] [3] [Greenhalgh, Stramer, et al, particular patient is been drawn from a
2010] patient’s GP held record. These SCR are
meant to be accessed by only authorised
clinical staff. [Greenhalgh, Stramer,
3.1.2 HEALTH SPACE AND Bratan, Byrne, Russell, Hinder, Potts,
SUMMARY CARE RECORD 2010]
SERVICE
NHS has adopted the technologies such as According to the survey report submitted
Health space and Summery Care Records by UCL, there are approximately 150K
to ensure that patient gets updated with SCR’s which were created by mid 2008
latest technologies, software throughout and there referred to basic, level-1 or
the medication. [4][Greenhalgh, 2010] release-1 SCR as these records had basic
Health Space is an online website information of a patient. Level-2 has some
providing services like booking an more updates to the services.
appointment, knowledge about health and
lifestyle, calendar and address book
through which the patients can store their
appointments and track them. Summery
care records service is linked to Health
space initially to know about services the Type of SCR Information in SCR
SCR is planned to provide. All these Level 1 or Release-1 Medication, Allergies
services are available only when the and Adverse Reactions.
patient registers into the site.
Level 2 or Release-2 A&E reports, discharge
summaries, outpatient
letters, lab reports.

Fig: Viewing SCR

3.2 TELEMEDICINE
The adoption of Telemedicine is gradually
increasing in healthcare industry.
Telemedicine can be offering different
services depending on the health
department. The services may vary like
patient to physician interaction, physician
to physician interaction for improving the
quality of healthcare and finally it can be
offering services like telephone helpline
for patient in emergency or who seek an
Fig: My HealthSpace account overview. advice. [Rohm, Rohm Jr, 2007] [Wootton,
Source: HealthSpace (2010) [internet] 1996]
available from[
https://www.healthspace.nhs.uk/] 3.2.1 NHS DIRECT – NATIONALLY
(accessed on 5 Sept, 2010) DIRECTED SERVICE
NHS Direct is a national health care
service through telephone and website.
3.1.3 SUMMARY CARE RECORDS The main role of NHS direct is to provide
high quality health care through health

4
advice, information and reassurance. single EPR software can store, transfer
Initially NHS Direct was a service through and retrieve patient clinical information
telephone advice and can me accessed by electronically which in turn has the ability
calling 08454647 and it is now offering to reduce clinical errors and improve the
services through Website and Digital TV quality of healthcare. The EPR systems
(self service) and still can contact a health are adopted and used to increase
professional through the service. [5] efficiency, reduce error rates and can be
[Department of Health, 2006] accessible for the patients, allowing them
to have more control on their own
3.2.2 NON EMERGENCY SERVICE healthcare. [9] [10] [11] [12]
- 111
The new 3-digit number 111 is a non 4.2.1 USES OF EPR
emergency telephone helpline which The main use of Electronic Patient Record
intends to advice high quality healthcare to is to improve the patient care and in
patients which is a 24 hours service. This context to a patient they will expect that
service is to provide immediate medical the records maintained electronically are
assistance and if there is an emergency accurate and used confidentially. If the
situation, an ambulance without any records are shared between the healthcare
further assessment. [6] [Department of team and hospitals the primary aim should
Health, 2010] be to improve the patient’s healthcare. The
There has been a wide discussion patient’s concern when the records are
about replacing NHS Direct by 111 which linked to expert systems that there is
is indeed is replacing the NHS Direct minimum chance of treatment errors and
08454647 number to memorable number maximum chance of best treatment.
111. [7] [Walport, 2010]

3.3 SEARCH ENGINES 4.2.2 ADVANTAGES AND


BENEFITS OF SCR IN NHS
3.3.1 NHS EVIDENCE SCR (Summary Care Records) is good
Among the latest technologies search approach in medical history as more
engines is also one of the internet source information is available for medical care.
which provide information and NHS Having a patient record electronically is
Evidence is one among the Search engines helpful mainly in case of emergency
which gives free access to all clinical and situations which will help the healthcare
non-clinical information. Information providers to save time and medicate the
includes evidence, guidance and govt patient immediately. An electronic patient
policy. The purpose of NHS Evidence is record can be helpful in giving the patient
for anyone in health and social care who correct medication according to the
takes decisions regarding treatments and information provided in the EPR. Useful
use of resources including GP’s, Nurses, for elderly people who might forget what
Consultants, Health professionals, the present and previous medication was
researchers and students.[8] and also to the people who are deaf.
[Greenhalgh, Wood, et al 2008]
The benefits of Electronic health
4. ELECTRONIC PATIENT record have some basic points like time
saving, availability, error reductions,
RECORDS
information sharing and clinical decision
making. [Gunter, Terry, 2005]
4.1 INTRODUCTION The summery care record helps the
The development of any healthcare healthcare providers to treat the patient
department depends on how the health quicker at the time of emergency as SCR
systems are linked, created to Electronic have basic emergency information that if
Patient Record (EPR) systems. As there an accident reported in Birmingham, the
are numerous benefits when EPR local accident and emergency department
technologies are adopted because the

5
can have the access to the patient’s records and healthcare staff will be in protecting
in London to check for the allergies, blood patient’s privacy and the confidentiality
type and present medication. [Walport, [Flores, Win, et al, 2009] of the electronic
2010] records because the consequences are
great if the medical record is leaked to
outsiders, the information can be used
against patient at the time of employment,
when setting up an insurance policy or to
public. [Tsai, 2010]
4.3 LEGAL, ETHICAL ISSUES
Legal and Ethical issues depend on
different aspects of dealing information
such as Negligence; is related to ethical
issue which occurs when there is Misuse
of data, wrong prescription, wrong use of
the systems, treatment according to race,
religion and under negligence there are
legal issue like fraud, abuse and trust.
[Johnson, Whearry, 2010]

5. SECURITY ISSUES IN CLINICAL Fig: Security Requirements in Electronic


INFORMATICS Healthcare System.
[Dritsas, Gymnopoulos, et al. 2006]
5.1 SECURITY
The above figure gives the description
Security concerns in electronic healthcare about identifying the security requirements
has been a major issue because vast as patient records which are accessed
amount of information is available online through networks are public in nature and
and a typical e-healthcare system has the communication between the networks
many components such as electronic is not private. Initially the application
health record, clinical information, lab should identify the user depending on the
information, pictures, videos, prescription authentication mechanism and then the
services and smart card details and these tracking the users who are authenticated
systems are vulnerable to security issues. are protected. The software developers
[Tsai, 2010] who are working on the implementation of
The development of Internet and adoption software in healthcare organisation should
of information technologies has been a concentrate on secured authentication and
major priority in leading industries management mechanisms because these
including healthcare. As the information is aspects are affecting the healthcare
available in many social networking sites industry as the information (patient’s data)
[Tsai, Han, et al, 2009], blogs [Chen, Tsai, is very sensitive. [Dritsas, Gymnopoulos,
et al, 2007] and medical records there has et al. 2006]
been a great demand for information to
store and retrieve. 5.2 AUTHENTICATION
Electronic health record systems using Global access to electronic patient records
updated technologies have added is necessary to the future of healthcare but
convenience to patient’s daily lives. strictly following legal, ethical and social
Earlier patient and hospitals used to rules and responsibilities to protect the
maintain paper based records and now the patient’s data privacy. One of the methods
doctors can access their patient to promise a patient’s confidentiality and
information with just a click. Now the integrity is by implementing
challenge of implementing these software authentication mechanisms and access
systems is to protect the patient control procedures to prevent unauthorized
information. Major role of the hospitals

6
entry to the sensitive information. exchanged in any kind of medium. [Kelly,
[Barrows, Clayton, 1996] McKenzie, 2002]
Extending a business operation
over the web is a modern day operation 5.4 PRIVACY AND ACCESS
and healthcare is one among them. The ideology behind access and control of
Healthcare people include hospitals, Electronic Patient Records is each clinical
physicians, insurance companies, drug record has to be marked with access
manufacturing companies and healthcare control list which has group of people who
trusts are implementing technologies and had opened and edited the record.
updating software to interact with the Controlling of the records is done when
patients which is an added advantage to the responsible person is marked in the
the patient. [Hu, Weaver, 2004] access control list. [Xiao, Hu, et al, 2009]
Various authentication techniques in Privacy to the electronic patient
healthcare include form basic user id and records is most concerned to many
password to all new bio metric techniques. healthcare institutions and the issues about
Firstly the bio metric methods privacy arises when most of the healthcare
(something the patient is) include finger institutions do not provide access for the
prints, signature, voice-recognition and iris patient’s to their own data and although
scan. [13] [Hu, Weaver, 2004] there is technical usefulness [Van
Another widely used authentication Wingerde, Schindler, et al, 1996] the
technique is the smart cards (something healthcare providers show interest towards
the patient posses) which are still in sharing data with the competitors.
process in NHS. The main functionality of [Kohane, Van Wingerde, et al, 1996] With
the smart card is similar to that of a bank the same behaviour of most of the
card with chip and pin. [NHS-Connecting healthcare professionals the patients are
for Health] becoming more anxious about the privacy
Public Key Infrastructure (PKI) is of their medical records. [Westin, 1996]
a cryptographic mechanism which can be Privacy is a major concern as IT systems
used for encrypting and decrypting data to are implemented in healthcare institutions
ensure information security. [Dwivedi, and then Electronic Patient Records are
Bali, et al, 2003] web-based and with this the fear of
The process of Digital signatures security to the information in the records
involves a PKI signing of an individual is arises. As the information of a patient is
private and can be used to hash and the shared using wireless internet to transmit
message has to be verified by the sender’s to multiple locations. [Rash, 2005]
public key which ensures authentication of
the data as well as keeping the information 5.5 PROTECTION USING MULTI
private. [Kelly, McKenzie, 2002] FACTOR AUTHENTICATION
According to UK Council for Health
5.3 CONFIDENTIALITY Informatics Professions (UKCHIP) the
NHS has defined the confidentiality issue of data privacy, wastage and
services to patient in four main ways they protection of these issues is the
are protecting patient information, responsibility if Informatics providers and
informing the patient about information they should look into aspects like Security
usage, giving the patients a choice whether and backup of the data. Not only
their information has to be disclosed and implementing the software but also
to support these three services there should checking the data quality when inputting
be a fourth service to improve the patients the record and those using the systems
clinical data. [13] [Department of Health] should handle them safely. [14]
British Medical Association has defined [UKCHIP]
the patient’s confidentiality as the Using smart cards and the chip
principle of keeping the information and pin services are the 2FA (Two Factor
secure and secret when the information is Authentication) can be implemented to
make the communication even more

7
secured. One of the authentication RECORDS-WORKING
mechanisms is the Public Key PROCEDURES
Infrastructure (PKI) and the concept The design of security walls is divided
regarding PKI were developed a long time into two main categories first is the web
in early 70’s and the usage of PKI in page which is the major security wall after
healthcare was recently adopted in early the user enters his/her user id and
2000. This PKI technology was first password and will not be redirected to the
adopted by financial industry and later by user account but faces a security password
the health organisations. [Hemmings, recognition page and Secondly after
2000] logging into the account the user can
A PKI is an authentication manage the account by selecting the
mechanism which can be encrypted and blocking mechanism which is widely
decrypted using two keys, one for followed in major social networking
encryption and another for decryption. The websites.
use of PKI in any kind of companies is to
achieve high level of security to the access 6.1 WORKING PROCEDURES OF
of information. The creation and usage of AUTHENTICATION PAGE
these keys and digital certificates are The web page developed here is about
maintained and provided by registering authentication techniques a user uses at
authorities which are responsible to issue home from their personal computers. In
public and private keys to each certificate general accessing online website involves
holder. [Etheridge, 2001] authentication techniques passwords,
Implementation of PKI authentication unique number and text seals.
with the smartcards is the recent progress This section gives a detailed
in securing the patient information. The description of basic password technique
central registry which issues the keys and and making it hard for the hackers to
maintains the authentication mechanisms access and break the password.
is the Health Access System which also Initially the process starts from
acts as a Middleware between the users selecting a password which is hard for any
and the applications. In this system when other person to remember except the
the user logs in remotely they have to owner. Secondly setting up few security
provide Two Factor Authentication questions in case the user forgets the id
Mechanisms such as entering their smart and password the security questions can
card and entering the key, by doing this fetch a new password to the personal
process then the user has an access to the email which is setup while registering.
application. The central registry which is This process is a routine procedure for any
the HAS will store the Smart Card number online website offering to store your
when the user log in for the first time and personal information.
then gives them an acknowledgment by Now the next authentication that is been
providing a Key. After this process then proposed here is Password Recognition. In
the user undergoes the Two Factor this process of password recognition the
Authentication by giving both Smart Card user has to remember their own password
and PKI details. This ensures high security because the next stage after entering user
for the unauthorized access and id and password is this recognition step.
maintaining the confidentiality of the Here the user will be asked to select
patient information. [15] random character number from the
password. This is one of the authentication
IMPLEMENTATION OF mechanisms in online banking. Every time
AUTHENTICATION AND the user enters his user id and password
PRIVACY MECHANISMS the second step of password recognition
displays random character selection and
6. IMPLEMENTATION OF these character numbers are different
SECURITY WALLS TO every time the user logins.
ELECTRONIC PATIENT

8
according to the sensitivity of the
information.
Health Information-Allergies-No Blocking
Personal Information-Email-Block Lab
Technician.
Personal Information-NI Number-Block
Password Mix the Vibgyor007 Lab Technician, Doctor.
password
with letters, Type Who Infor Block Blocki
numbers and of ? matio ng
symbols. Infor n setting
Sign in User id – Pwd = matio s
xyzabc vibgyor007 n
Allerg Doct Allerg This This
ies ors ic to infor inform
Penici matio ation
Password Char 3=? Nurs llin n is can be
recognition Char 8=? e import blocke
Table: Password Recognition Process. ant at d
Lab the accord
techn time ing to
ician of the
emerg EPR
Ever ency. syste
yone ms
usage.
Other
Addre YP12 Not so Block
ss and EP6 import lab
postco ant to techni
de a lab cian
techni
cian.
Table: Blocking settings to a Patients
Information.

The web page below describes the


Fig: Password Recognition. importance of information to be blocked
and the privacy settings can be applied to
6.1 WORKING PROCEDURES OF each and every part of the information like
AUTHENTICATION PAGE Allergies, Reactions, Blood type, previous
The web page designed here is about doctor, Present doctor, Present illness,
Privacy Blocking setting which we Tests, Planning, Visits, Prescriptions and
commonly see and use in social more health information. Not only the
networking sites like Facebook and health information is blocked but also
Twitter. The idea behind this web page is personal data has to be blocked such as
to give the patient (might have a social Address, Contact numbers, Mobile
networking account) an Electronic Patient numbers, NI number, NHS Number, Post
Record which has similar privacy blocking code and Email.
settings as in social networking sites.
Here in this page a patient can
manage their own information and block

9
blocking page that is introduced has the
Blocking Locks.

7. CRITICAL EVALUATION AND


LESSONS LEARNT

7.1 FINDINGS
Implementation of technologies and
delivering information through web is a
major source of communication in almost
every different kind of institutions.
The initial findings on clinical
informatics helped to understand that
Electronic Patient Records is one of the
clinical informatics aspect which is and
issue since a very long time. The main
Fig: Privacy Blocking to the Patient aspects that lead to issues are the privacy
Information. and confidentiality of the data and
implementation of the software
When the above Blocking page is technologies in current health
compared to NHS Summary Care Records organisations.
page below, Privacy Blocking Settings or Software installations have been a
Privacy Locks are missing. major drawback in NHS till the midst of
2010. The software called Lorenzo is a
patient administration system which
involves duties like patient booking,
managing patient records and referrals.
This software is developed by one of the
US leading outsourcing company
Computer Science Corporation (CSC) and
Australian software supplier isoft which
indeed failed to install the software on
time and with all these IT failures the
Clinical Informatics group which is the
NPfIT should concentrate on elements
such as “How the Software is installed”,
“how accessible is it to the clinical staff”,
“Is the Software installed with all the
security requirements”.
Use of Passwords and Security
measures to clinical data has been a
Fig: NHS Summary Care Record Patient critical issue with the NHS in the year
Information 2009. There were approximately 140
Security breaches to the data which were
In the above figure we can see the NHS related to - confidentiality aspects like
Summary care Record page where the leaving the data unattended and some data
patient or the clinical staffs fill the was left in encrypted discs, Security
personal and health information of the aspects such as downloading the patient
patient and also information about database on to an Unsecured laptop(was
registered GP. Here as we can see the later stolen) which included thousands of
difference between Figure SCR and the medical records. Another major security
Figure Privacy Blocking page is that the breach was a memory stick which had
SCR has no Privacy Locks or any other thousands of patient medical records was
Sealed Envelopes where as the privacy lost even though the data is encrypted the

10
password was attached as a note in the to their profile unless the user crosses the
device. “Security Wall” which will ask the user
According to Mick Gorill[Assistant their password but not as it is. There will
Information Commissioner in charge of be a random character check for example
enforcement, 2009] insurance companies “Enter your Character 5, 8, 9 or 2,4,1 of
hire private detectives to find out the your password” this might stop the user
medical histories. if the user is an Unauthorised person.
So this clearly shows that the Introducing these techniques helped me to
information in medical records is not understand and learn more about:
private, they can be available globally for  Authentication techniques
good and bad cause. The responsibility of and security constraints.
clinical informatics staff who are  Uses of Information
responsible with dealing information or Technology in Healthcare.
data about every patient should know  Electronic Patient Records
some of the rules like Data Protection and the systems used to
Laws, Security Setting of the Software store retrieve and manage
using, authentication safety techniques these records.
like signing out after using patient’s  What actually happening
profile, not to leave computers unattended in NHS and Clinical
after signing in, who to contact if the Informatics and IT
software does not work or hangs up. If Programmes for
these simple steps are followed there is a improving healthcare.
good chance of improving patient’s  Summery Care Records
information security. which are most
controversial aspect
7.2 EVALUATION because of privacy issues
but if considered the
I have introduced two security measures in benefits of SCR it is very
my report which might be a sensible useful at times of
approach when implemented in Electronic emergency.
Patient Records systems. One of it is the  SQL Injection and types
“Privacy Blocking Settings” which is of Queries and tried some
similar to Facebook Privacy Settings. The queries which are
main reason to adopt these settings is exclusively for
clearly because of the number of users educational purpose.
using them is very high. So these Privacy Implementation of security features like
Settings are not new but giving the patient PKI and Smart card Authentication
the same options to his/her Electronic Mechanism and combination of both the
Patient Record is new and if the user has a techniques must be adopted for even more
Facebook account then he/she can identify tight security.
the Privacy Settings and can manage
according the comfort.
7.3 FUTURE WORK
Second is the “Security Wall –
Authentication Technique”, the most  Multifactor Authentication
common authentication when using a techniques to tighten the security.
website is ID and Password or Unique ID  Involvement of patient’s role in
Numbers. What is the common thing that their own Personal Patient Record
happens after signing in? After entering and providing information on
your ID and PWD the website will security through seminars and
automatically approve your details and practical explanation of Privacy
shows the profile, this is what happens to and how to manage the health
most of the websites. records.
But the second method proposed  Approved clinical staff to operate
here is the page after the user enters ID Computers and Software.
and PWD, the user will not be redirected

11
 Computerised physicians which companies and Drug
means when there is a situation manufacturing companies even
when the doctor has to prescribe a though there are significant
patient through Electronic benefits if the data of a patient is
Prescription Service, the given to an insurance company.
physicians should know basic  Lack of computer and software
typing, use of printing, use of the application knowledge in clinical
particular software on which they staff.
are depending.  Lack of knowledge about
 Knowledge and responsibility importance of security aspects.
towards Data Protection and  Summary Care Records will be
Patient Information automatically uploaded on to the
Confidentiality. web if there is no response from
 Only implementing costly the patient.
software is not really the  About SQL Injections practically.
conclusion about giving quality of  Implementation knowledge about
care to patient. Domain Name Servers and
 Aim should be towards on how to Registering Domains.
use the software.  About Web Hosting.
 Security concerns should be  Activities about Department of
towards Secure Storage, Secure Health, NHS plans, Primary Care
Communication, management and trusts, National Programme for
implementation and Network Information Technology and
Protection. many healthcare providers and the
As discussed in the report about Security role of them in Clinical
requirements and Multi Factor Informatics.
Authentication, the implementation of any
software for clinical purpose must be 7.5 CONCLUSION
securely configured. One recent example Across the whole document there are
is NHS organisation in North London have several chapters which describe the
implemented Multi Factor Authentication aspects of Clinical Informatics and one its
by integrating two types of security checks application is the Electronic Patient
such as PKI and Smart Card which is to Records, the main aim of the system is to
ensure that patient’s electronic data is not provide improved quality of care to
wasted or damaged nor pointed to any patients.
security breaches. Accessing the Electronic Patient
Records or sharing the information in the
7.4 FINDINGS records is through a public network like
After implementing the whole work there Internet will never be private. So the
are few things I now know about Clinical background here is the security which in
Informatics: turn means to protect the CIA triad of the
 Not only Electronic Patient data, nothing but Confidentiality, Integrity
Records are part of Clinical and Availability of the data; privacy which
Informatics there are many other means following each and every terms or
aspects of Clinical Informatics rules and regulations set by the health
such as Electronic Prescription department on Data Protection. This is
Service, separate Lab Report about the information in Electronic Patient
Services and combination of Records, the security and privacy of the
Information, Technology, data can be reduced if only Computer
Physician and Patient is also Literate Employees are working with the
Clinical Informatics. systems or by training a clinical staff.
 About wrong usage of data such Summary Care Records are part of
as providing access to the Electronic Patient Records which has only
information to Insurance the summary of patient’s health

12
information which is accessible by Yasnoff, W., P. O Carroll, et al. (2000).
Clinical staff, Physicians and also by the "Public health informatics: improving and
Patient from his/her personal computer transforming public health in the
through logging into Healthspace which information age." Journal of Public Health
provide access to the patient to view and Management and Practice 6(6): 67-75.
amend changes to SCR.
Based on the SCR programme, MacKie-Mason, J. and D. Groth (2010).
keeping in mind the Patient can have "Why an informatics degree?".
access to their own records the dissertation
practical is designed specially for the NBU, D. (2002). "Michael Fourman."
patient’s who are not well familiar with Groth, D. and J. MacKie-Mason (2010).
Computers, filling electronic forms and "Why an informatics degree?"
these “User Friendly Authentication and Communications of the ACM 53(2): 26-
Blocking Settings” can at least reduce the 28.
patient confusion towards which data to be
exposed and which of the information to Hughes, P. (2007). "How health-
be blocked. informatics practitioners in England’s
Next big thing is the role of NHS view their personal and professional
Government in health department, development." Br J Healthcare Comput
Healthcare organisation NHS and Info Manage 24(4): 20-22.
Programme for IT department, how many
billions are spent on Software
Implementations and failures, all the Hersh, W. (2002). "Medical informatics:
groups here are concerned about patient’s improving health care through
data privacy. But more concern should be information." Jama 288(16): 1955.
towards how securely the software is
installed and who is using the Software,
Sarkar, I. (2010). "Biomedical informatics
are they trained and Patient Ownership
and translational medicine." Journal of
towards their own data, these aspects will
Translational Medicine 8(1): 22.
bring new confidence in patients who wish
to have an SCR. As discussed about Multi
factor Authentication in the paper and Costa, B., K. Fitzgerald, et al. (2009).
according to the recent updates on "Effectiveness of IT-based diabetes
healthcare and NHS, some of the NHS management interventions: a review of the
organisations implemented 2FA (2 Factor literature." BMC family practice 10(1): 72.
Authentication) which include using of
PKI (Public Infrastructure Key) and Smart [1] [Department of Health. (2010), NHS:
cards for the user who want to access the Informatics Planning 2010/11.],
information remotely. While [Department of Health. (2009),
implementing these high quality security Implementing the Next Stage Review
systems the Patients should be given Visions: The Quality and Productivity
information, Notice, Demo about the new Challenge.]
technologies that NHS is currently using,
by doing this the patients who are not Gardner, R., J. Overhage, et al. (2009).
interested in Electronic Records will gain "Core content for the subspecialty of
trust and NHS might get good number of clinical informatics." Journal of the
SCR’s as planned. American Medical Informatics
Association 16(2): 153.
8. REFERENCES

Diekema, D. (2010). "Practical Healthcare [Bates, D. (2002). "The quality case for
Epidemiology." Jama 304(3): 354. information technology in healthcare."
BMC medical informatics and decision
making 2(1): 7.]

13
[de Wildt, S., R. Verzijden, et al. (2007). [7] [Department of Health. (2010) “NHS
"Lesson of the Week: Information Direct Services and new NHS 111
technology cannot guarantee patient number]
safety." BMJ: British Medical Journal
334(7598): 851.] [8] [National Institute for Health and
Clinical Excellence,
[Murphy, D., A. Bjartell, et al. (2009). www.evidence.nhs.uk, last accessed on 5th
"Downsides of robot-assisted laparoscopic September 2010]
radical prostatectomy: limitations and
complications." European Urology.] [9] [Department of Health. (2010), “Facts
about EPR electronic patient records
[2] [Department of Health. (2002), essential reading for all clinicians, NHS
Delivering 21st Century IT support for the Executive, EPR Programme”]
NHS: national strategic programme, June
2002, p.1] [Accessed July 2010] [10] [Great Britain. Parliament. House of
Commons. Health Committee. The
[3] [Department of Health. (2002), Electronic Patient Record: progress since
Delivering 21st Century IT support for the 2007: Sixth Report of Session 2006-07]
NHS: national strategic programme, June
2002, p.1] Accessed July 2010] [11] [ISBN: 0215036123, Great Britain.
Parliament. House of Commons. Health
[4] [Greenhalgh, T., K. Stramer, et al. Committee. Barron, Kevin, The electronic
"THE DEVIL’S IN THE DETAIL.", patient record : sixth report of session
2010] 2006-07. Vol. 1 : Report, together with
formal minutes.]
[Greenhalgh T, Stramer K, Bratan T,
Byrne E, Russell J, Hinder S, Potts H. The [12] [House of Commons papers. Session
Devil’s in the Detail: Final report of the 2006-07; HC 422-I
independent evaluation of the Summary http://www.publications.parliament.uk/pa/
Care Record and HealthSpace cm200607/cmselect/cmhealth/422/422.pdf
programmes. London: University College ]
London; 2010.]
[Walport, M. (2010). "Do summary care
records have the potential to do more harm
[Rohm, B. and C. Rohm Jr "Clinical than good? No." British Medical Journal
Informatics: A New Paradigm for 340(jun16 4): c3022.]
Advances in BioMedical Informatics.",
2007]
[Greenhalgh, T., G. Wood, et al. (2008).
[Wootton, R. (1996). "Telemedicine: a "Patients' attitudes to the summary care
cautious welcome." British Medical record and HealthSpace: qualitative
Journal 313(7069): 1375.] study." British Medical Journal 336(7656):
1290]
[5] [Department of Health. (2006), NHS
Direct Commission Framework April [Gunter, T. and N. Terry (2005). "The
2006-march 2007: Guidance for Primary emergence of national electronic health
care Trusts on Commissioning NHS record architectures in the United States
Direct Services from April 2006] and Australia: models, costs, and
questions." Journal of Medical Internet
[6] [Department of Health. (2010), 111- Research 7(1).]
The New Number for the Future of Non-
Emergency Health Service] [Johnson, P. and S. Whearry (2010). "The
Identification and Resolution of Ethical
Issues in Health Care: Theoretical and

14
Practical Viewpoints." Online Journal of [Kohane, I., F. Van Wingerde, et al.
Health Ethics 6(1).] (1996). Sharing electronic medical records
across multiple heterogeneous and
[Tsai, F. (2010). "Security Issues in E- competing institutions, American Medical
Healthcare." Journal of Medical and Informatics Association.]
Biological Engineering 30(4).]
[Westin, A. (1996). "Harris-Equifax
[Tsai, F., W. Han, et al. (2009). "Design consumer privacy survey 1991." Atlanta,
and development of a mobile peer-to-peer GA: Equifax Inc.]
social networking application." Expert
Systems with Applications 36(8): 11077- [14] [UKCHIP, 2009. “Independent
11087.], Review of NHS and Social Care IT”.
from http://media.ft.com/cms/bfdf9c1e-
[Chen, Y., F. Tsai, et al. (2007). Blog 85b3-11de-98de-00144feabdc0.pdf]
search and mining in the business domain, [Accessed 5 Aug 2010]
ACM.]
[Hemmings, T. (2000). "PKI: up close and
[Dritsas, S., L. Gymnopoulos, et al. personal." Health management technology
(2006). "A knowledge-based approach to 21(9): 20.]
security requirements for e-health
applications." Electronic Journal for E- [Etheridge, Y. (2001). "PKI (public key
Commerce Tools and Applications.] infrastructure)--how and why it works."
Health management technology 22(1):
[Barrows, R. and P. Clayton (1996). 20.]
"Privacy, confidentiality, and electronic
medical records." Journal of the American [15] [Search Security (2010, Sept) “NHS
Medical Informatics Association 3(2): smart card devices enable secure access to
139.] health care apps.” From
http://searchsecurity.techtarget.co.uk/news
[Dwivedi, A., R. Bali, et al. (2003). /article/0,289142,sid180_gci1519515,00.ht
Towards a practical healthcare information ml accessed Sept 10, 2010]
security model for healthcare institutions.]
9. BRIEF BIOGRAPHY
[Hu, J. and A. Weaver (2004). A dynamic,
context-aware security infrastructure for Arunkumar Reddy Marepally, M.Sc. is
distributed healthcare applications.]
a graduate student of Computing,
Information Technology and
[13] [Department of Health. (2003),
Engineering, University of East
Confidentiality: NHS Code of Ethics.]
London, Docklands Campus, University
Way, London E16 2RD.
[Kelly, G. and B. McKenzie (2002).
"Security, privacy, and confidentiality
Dr. Chris Imafidon is a Senior Lecturer at
issues on the Internet." Journal of Medical
Internet Research 4(2).] Computing, Information Technology
and Engineering, University of East
[Xiao, L., B. Hu, et al. (2009). Towards London, Docklands Campus, University
Knowledge Sharing and Patient Privacy in Way, London E16 2RD.
a Clinical Decision Support System.] Formerly, Head of Management of
Technology Unit, Queen Mary, University
[Van Wingerde, F., J. Schindler, et al. of London.
(1996). Using HL7 and the World Wide Guest Seminar Lecturer at University of
Web for unifying patient data from remote Cambridge.
databases, American Medical Informatics Guest Lecturer at University of Oxford.
Association.]

15

You might also like