Subscribe to Our Newsletter

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks

Part 2: Ransomware and the challenge of protecting patient information

In my last article I shared information about the vulnerability of computer networks against a form of malware known as ransomware. In review, ransomware is a hack that encrypts all files on a computer or network so they are inaccessible. (In some cases operating systems have also been encrypted). I

Brian Chicoine profile image
by Brian Chicoine
Part 2: Ransomware and the challenge of protecting patient information

Computer security code abstract image. Password protection conceptual image.
Computer security code abstract image. Password protection conceptual image.

forward focus logo

In my last article I shared information about the vulnerability of computer networks against a form of malware known as ransomware. In review, ransomware is a hack that encrypts all files on a computer or network so they are inaccessible. (In some cases operating systems have also been encrypted). In order to gain access to the files, the victim is required to pay a ransom to the hackers using untraceable bitcoins. What has made ransomware even more concerning is that the healthcare industry has been targeted in recent months, which has put the systems used to protect patient privacy to the test.

Healthcare cloud security

Protecting patient information is a challenging but vital component of the healthcare system. State and local governments as well as healthcare organizations all have policies and procedures to ensure the protection of patient data. On the federal level, there is the Health Insurance Portability & Accountability Act, (HIPAA). This federal law provides privacy standards to protect patients’ Protected Health Information, (PHI), provided to health plans, doctors, hospitals and other healthcare providers. PHI generally refers to demographic information, medical history, test and laboratory results, insurance information and other data that a healthcare professional collects in order to identify an individual and to determine appropriate care. HIPAA ensures that PHI is secure, whether it is hard copies or digitally stored. In addition, the  Health Information Technology for Economic and Clinical Health, (HITECH), Act is designed to promote the adoption and meaningful use of healthcare information technology. This federal law also addresses privacy and security concerns, as well as strengthens enforcement of HIPAA rules.

Having security standards that address both hard as well as electronic records is vital in today’s healthcare world because the transmission and storing of patient information is increasingly electronic. Healthcare processes that are increasingly electronic include scheduling, dictation, transcription, coding, and medical record storage. Not only are many processes done electronically, but a healthcare facility could use several different companies for the transmission and storage of PHI, which increases the need for good security.

Data security computer.
Data security computer.

Hospitals and other healthcare organizations utilize software and hardware to protect their patient data, most of which is developed and maintained internally and is compliant to or greater than federal guidelines. Some healthcare organizations use outside vendors such as ClearData to manage and secure their cloud storage. There is also a need to safeguard physical documents, such as scanned medical records, that are often kept off-site. For this, many healthcare organizations rely on companies such as Access and Iron Mountain.

PHI

In addition to electronic security systems and document storage, there are actions that do not involve electronics or “the cloud.” Some of these include confirming a patient’s identity at the first encounter, not discussing a patient’s case with any unauthorized parties without their permission, not leaving hard copies of forms or records where unauthorized persons may access them, and using only secured routes to send patient information, (and always marking the information as confidential). Confidentiality is further protected by keeping records that contain patient names and other identifying information in closed, locked files, restricting access to electronic databases to designated staff, protecting computer passwords or keys, safeguarding computer screens, keeping computers in a locked or restricted area, physically or electronically locking hard disks, keeping printouts of electronic information in a restricted or locked area and destroying printouts that are no longer needed.

It takes a lot of planning and maintaining to ensure that healthcare organizations have policies and procedures in place to ensure that patient data is safe and secure and to prevent and minimize breaches. The American healthcare industry is working hard – and utilizing many modern technologies as well as taking common-sense steps – to ensure that our personal data is protected.


email box

You’re one click away! Sign up for our free eNewsletter and never miss another thing


Chicoine

Brian Chicoine was born in Nashua and raised in Manchester, graduating from West High School. After earning his undergraduate degree from Rhode Island College in Providence, Brian and his family lived in Manchester for about five years before returning to the Ocean State. Brian has merged his passion for entrepreneurship and innovation with his love of new and bold ideas to bring fresh perspectives on the way things are done. Brian, his wife Jackie and their two boys live in Rhode Island, but their hearts are in New Hampshire.

GMT

Detect language
Afrikaans
Albanian
Arabic
Armenian
Azerbaijani
Basque
Belarusian
Bengali
Bosnian
Bulgarian
Catalan
Cebuano
Chichewa
Chinese (Simplified)
Chinese (Traditional)
Croatian
Czech
Danish
Dutch
English
Esperanto
Estonian
Filipino
Finnish
French
Galician
Georgian
German
Greek
Gujarati
Haitian Creole
Hausa
Hebrew
Hindi
Hmong
Hungarian
Icelandic
Igbo
Indonesian
Irish
Italian
Japanese
Javanese
Kannada
Kazakh
Khmer
Korean
Lao
Latin
Latvian
Lithuanian
Macedonian
Malagasy
Malay
Malayalam
Maltese
Maori
Marathi
Mongolian
Myanmar (Burmese)
Nepali
Norwegian
Persian
Polish
Portuguese
Punjabi
Romanian
Russian
Serbian
Sesotho
Sinhala
Slovak
Slovenian
Somali
Spanish
Sundanese
Swahili
Swedish
Tajik
Tamil
Telugu
Thai
Turkish
Ukrainian
Urdu
Uzbek
Vietnamese
Welsh
Yiddish
Yoruba
Zulu
Afrikaans
Albanian
Arabic
Armenian
Azerbaijani
Basque
Belarusian
Bengali
Bosnian
Bulgarian
Catalan
Cebuano
Chichewa
Chinese (Simplified)
Chinese (Traditional)
Croatian
Czech
Danish
Dutch
English
Esperanto
Estonian
Filipino
Finnish
French
Galician
Georgian
German
Greek
Gujarati
Haitian Creole
Hausa
Hebrew
Hindi
Hmong
Hungarian
Icelandic
Igbo
Indonesian
Irish
Italian
Japanese
Javanese
Kannada
Kazakh
Khmer
Korean
Lao
Latin
Latvian
Lithuanian
Macedonian
Malagasy
Malay
Malayalam
Maltese
Maori
Marathi
Mongolian
Myanmar (Burmese)
Nepali
Norwegian
Persian
Polish
Portuguese
Punjabi
Romanian
Russian
Serbian
Sesotho
Sinhala
Slovak
Slovenian
Somali
Spanish
Sundanese
Swahili
Swedish
Tajik
Tamil
Telugu
Thai
Turkish
Ukrainian
Urdu
Uzbek
Vietnamese
Welsh
Yiddish
Yoruba
Zulu

Text-to-speech function is limited to 100 charactersOptions : History : Help : FeedbackClose

Brian Chicoine profile image
by Brian Chicoine

Subscribe to New Posts

Lorem ultrices malesuada sapien amet pulvinar quis. Feugiat etiam ullamcorper pharetra vitae nibh enim vel.

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks

Read More