Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01226-3
Basic Von Solms
No computer system or computer network can today be operated without the necessary security measures to secure and protect the electronic assets stored, processed and transmitted using such systems and networks. Very often the effort in managing such security and protection measures are totally underestimated. This paper provides an overview of the security management needed to secure and protect a typical IT system and network. Special reference is made to this management effort in healthcare systems, and the role of the information security officer is also highlighted.
{"title":"Managing secure computer systems and networks","authors":"Basic Von Solms","doi":"10.1016/S0020-7101(96)01226-3","DOIUrl":"10.1016/S0020-7101(96)01226-3","url":null,"abstract":"<div><p>No computer system or computer network can today be operated without the necessary security measures to secure and protect the electronic assets stored, processed and transmitted using such systems and networks. Very often the effort in managing such security and protection measures are totally underestimated. This paper provides an overview of the security management needed to secure and protect a typical IT system and network. Special reference is made to this management effort in healthcare systems, and the role of the information security officer is also highlighted.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 47-52"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01226-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01237-8
Roderick Neame
In 1993 the first national health information service went live in New Zealand, using commercial network services for all communications. This system provides a point of connection for all health personnel, and for those with a legitimate interest in health care information (e.g. insurers): it also provides access to a number of information resources managed on behalf of the government of New Zealand (e.g. index of health care users), as well as to those developed by individual network service providers. Much of the data exchanged across this network is personalised. Since the recipient may not be known personally to the sender, it is vital that the sender has confidence that the recipient will treat personal information according to agreed criteria for privacy. A Code of Practice covering health information was developed under the New Zealand Privacy Act to ensure that the confidence to share confidential data was supported. For large organisations such as hospitals to function efficiently, they need the flexibility to be able quickly to assign user privileges to selected staff without the need for extra paperwork seeking approval from the centre. But the audit trail requires unique identification of the individual undertaking each transaction. This requirement has been addressed. Some of the data moved across the network relates to life-critical issues, e.g. clinical warnings about allergies or serious medical conditions. A failure of communications causing this vital information to be improperly represented in some way on the receivers system could have disastrous consequences. To ensure the integrity of data transfers, user installations have to be certified compliant with standard test scripts before they are authorised for access to these resources.
{"title":"Privacy and security issues in a wide area health communications network","authors":"Roderick Neame","doi":"10.1016/S0020-7101(96)01237-8","DOIUrl":"10.1016/S0020-7101(96)01237-8","url":null,"abstract":"<div><p>In 1993 the first national health information service went live in New Zealand, using commercial network services for all communications. This system provides a point of connection for all health personnel, and for those with a legitimate interest in health care information (e.g. insurers): it also provides access to a number of information resources managed on behalf of the government of New Zealand (e.g. index of health care users), as well as to those developed by individual network service providers. Much of the data exchanged across this network is personalised. Since the recipient may not be known personally to the sender, it is vital that the sender has confidence that the recipient will treat personal information according to agreed criteria for privacy. A Code of Practice covering health information was developed under the New Zealand Privacy Act to ensure that the confidence to share confidential data was supported. For large organisations such as hospitals to function efficiently, they need the flexibility to be able quickly to assign user privileges to selected staff without the need for extra paperwork seeking approval from the centre. But the audit trail requires unique identification of the individual undertaking each transaction. This requirement has been addressed. Some of the data moved across the network relates to life-critical issues, e.g. clinical warnings about allergies or serious medical conditions. A failure of communications causing this vital information to be improperly represented in some way on the receivers system could have disastrous consequences. To ensure the integrity of data transfers, user installations have to be certified compliant with standard test scripts before they are authorised for access to these resources.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 123-127"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01237-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01222-6
Francis H. Roger France
The electronic health record offers all advantages of computer based memories. It is accessible over networks, highly structured and allows exchange of information both within the institution and across its borders. However, it has potential disadvantages among which a great risk for confidentiality, integrity and availability of information about identifiable patients exists. The present paper discusses advantages and disadvantages of the electronic health record as well as methods in order to control and use appropriately identifiable patient data. Personal data protection requires a legislation, a code of conduct, information contracts, an organisation under the responsibility of a physician, technical tools for health security, risk analysis methods, standards for development and implementation of computer systems as well as training and teaching sessions.
{"title":"Control and use of health information: a doctor's perspective","authors":"Francis H. Roger France","doi":"10.1016/S0020-7101(96)01222-6","DOIUrl":"10.1016/S0020-7101(96)01222-6","url":null,"abstract":"<div><p>The electronic health record offers all advantages of computer based memories. It is accessible over networks, highly structured and allows exchange of information both within the institution and across its borders. However, it has potential disadvantages among which a great risk for confidentiality, integrity and availability of information about identifiable patients exists. The present paper discusses advantages and disadvantages of the electronic health record as well as methods in order to control and use appropriately identifiable patient data. Personal data protection requires a legislation, a code of conduct, information contracts, an organisation under the responsibility of a physician, technical tools for health security, risk analysis methods, standards for development and implementation of computer systems as well as training and teaching sessions.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 19-25"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01222-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01227-5
Georges J. Pangalos
Medical database security plays an important role in the overall security of medical information systems. The development of appropriate secure database design and operation methodologies is an important problem in the area and a necessary prerequisite for the successful development of such systems. The general framework for medical database security and a number of parameters of the secure medical database design and operation problem are presented and discussed. A secure medical database development methodology is also presented which could help overcome some of the problems currently encountered.
{"title":"Secure medical databases: design and operation","authors":"Georges J. Pangalos","doi":"10.1016/S0020-7101(96)01227-5","DOIUrl":"10.1016/S0020-7101(96)01227-5","url":null,"abstract":"<div><p>Medical database security plays an important role in the overall security of medical information systems. The development of appropriate secure database design and operation methodologies is an important problem in the area and a necessary prerequisite for the successful development of such systems. The general framework for medical database security and a number of parameters of the secure medical database design and operation problem are presented and discussed. A secure medical database development methodology is also presented which could help overcome some of the problems currently encountered.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 53-60"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01227-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01234-2
Marianne Tallberg
The purpose of the paper was to find and discuss methods for teaching secure communication. A survey to a sample of nursing schools was executed. The teachers were asked to define ‘secure communication’ and to relate teaching methods used. Theories supporting the proposed methods were discussed. Conclusively it was found that a joint task force including IMIA WG4 and the IMIA and EFMI nursing groups for selecting an educational strategy in teaching ‘secure communication’ is highly recommended.
{"title":"Teaching secure communication: a challenge for nurse educators","authors":"Marianne Tallberg","doi":"10.1016/S0020-7101(96)01234-2","DOIUrl":"10.1016/S0020-7101(96)01234-2","url":null,"abstract":"<div><p>The purpose of the paper was to find and discuss methods for teaching secure communication. A survey to a sample of nursing schools was executed. The teachers were asked to define ‘secure communication’ and to relate teaching methods used. Theories supporting the proposed methods were discussed. Conclusively it was found that a joint task force including IMIA WG4 and the IMIA and EFMI nursing groups for selecting an educational strategy in teaching ‘secure communication’ is highly recommended.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 101-104"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01234-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01229-9
Jorma Kuopus
The legal position of confidentiality and the safe transmission of medical information is examined in the context of the EU Directive and the technical mechanisms available for addressing these problems.
在欧盟指令和解决这些问题的现有技术机制的背景下,审查了保密和安全传输医疗信息的法律地位。
{"title":"Legal aspects of safe communication","authors":"Jorma Kuopus","doi":"10.1016/S0020-7101(96)01229-9","DOIUrl":"10.1016/S0020-7101(96)01229-9","url":null,"abstract":"<div><p>The legal position of confidentiality and the safe transmission of medical information is examined in the context of the EU Directive and the technical mechanisms available for addressing these problems.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 69-74"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01229-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01240-8
Pentti Itkonen
{"title":"Network projects in the North Karelian Hospital District","authors":"Pentti Itkonen","doi":"10.1016/S0020-7101(96)01240-8","DOIUrl":"10.1016/S0020-7101(96)01240-8","url":null,"abstract":"","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 143-146"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01240-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01221-4
Seppo Immonen
Information security is a must in health care as is commonly know. This paper describes the conflict between the strategic goals of an organisation and organising information security and confidentiality. Because of local strategies and the organisational effect on the need for information, it is necessary to describe the main features of the Finnish Health care system and Helsinki City Health Department.
{"title":"Developments in health care, the increasing role of information technology: security issues","authors":"Seppo Immonen","doi":"10.1016/S0020-7101(96)01221-4","DOIUrl":"10.1016/S0020-7101(96)01221-4","url":null,"abstract":"<div><p>Information security is a must in health care as is commonly know. This paper describes the conflict between the strategic goals of an organisation and organising information security and confidentiality. Because of local strategies and the organisational effect on the need for information, it is necessary to describe the main features of the Finnish Health care system and Helsinki City Health Department.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 9-15"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01221-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1996-10-01DOI: 10.1016/S0020-7101(96)01225-1
Daniel de Roulet, Jean-Raoul Scherrer
Securing health information is an application domain which can learn more from other environments like airlines and banking than from military formalism or academic freedom. The techniques of the 80s using clear separation between public and private areas have to be upgraded. Propositions are made. Costs are evaluated.
{"title":"Technical means for securing health information","authors":"Daniel de Roulet, Jean-Raoul Scherrer","doi":"10.1016/S0020-7101(96)01225-1","DOIUrl":"10.1016/S0020-7101(96)01225-1","url":null,"abstract":"<div><p>Securing health information is an application domain which can learn more from other environments like airlines and banking than from military formalism or academic freedom. The techniques of the 80s using clear separation between public and private areas have to be upgraded. Propositions are made. Costs are evaluated.</p></div>","PeriodicalId":75935,"journal":{"name":"International journal of bio-medical computing","volume":"43 1","pages":"Pages 39-44"},"PeriodicalIF":0.0,"publicationDate":"1996-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0020-7101(96)01225-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"19923456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}