09.11.2012 Views

Pediatric Informatics: Computer Applications in Child Health (Health ...

Pediatric Informatics: Computer Applications in Child Health (Health ...

Pediatric Informatics: Computer Applications in Child Health (Health ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

23 Electronic Mail <strong>in</strong> <strong>Pediatric</strong> Practice 313<br />

23.2.3 Breaches of Security and Privacy<br />

The <strong>Health</strong> Insurance Portability and Accountability Act (HIPAA) sets federal<br />

requirements for privacy and security of protected health <strong>in</strong>formation (PHI). Though<br />

this legislation primarily deals with electronic data transmission and <strong>in</strong>terchange of<br />

bill<strong>in</strong>g <strong>in</strong>formation, it also addresses all electronic health care communications,<br />

<strong>in</strong>clud<strong>in</strong>g e-mail communications.<br />

HIPAA does not prohibit e-mail communications between physicians and<br />

patients or between physicians but recognizes that e-mail (and any health <strong>in</strong>formation<br />

technology) presents risks to privacy and that anyone us<strong>in</strong>g e-mail needs<br />

to (a) identify risks to the unauthorized access to personal health <strong>in</strong>formation and<br />

(b) adopt policies and procedures to mitigate those risks. HIPAA also requires that<br />

office policies, as they relate to its use of medical <strong>in</strong>formation be made known to<br />

patients and made available <strong>in</strong> the practice’s Information Privacy Notice.<br />

Practice policies<br />

The HIPAA Security Rule specifies that practices (and other “covered entities”)<br />

must use physical, technical, and adm<strong>in</strong>istrative safeguards with PHI. The HIPAA<br />

Privacy Rule specifies that safeguards must <strong>in</strong>clude audit<strong>in</strong>g and disclosure procedures<br />

(for breaches). For e-mail, this <strong>in</strong>cludes, but is not limited to:<br />

Limited physical and password-protected access to practice computer systems<br />

(<strong>in</strong>clud<strong>in</strong>g e-mail)<br />

Use of secure e-mail (either secure messag<strong>in</strong>g or private service) with backup systems<br />

Policies to remove access for employees who no longer work for the practice<br />

E-mail practices<br />

Patients and families themselves may be the greatest threat to their e-mail privacy.<br />

Poor e-mail practices (by patients and/or practices) that may put privacy at risk<br />

<strong>in</strong>clude:<br />

Leav<strong>in</strong>g computers unattended while logged <strong>in</strong>to e-mail or leav<strong>in</strong>g screens or<br />

pr<strong>in</strong>ted messages open and accessible to others; not destroy<strong>in</strong>g discarded messages<br />

appropriately (shredd<strong>in</strong>g documents, empty<strong>in</strong>g “Trash” or “Recycle” b<strong>in</strong>s)<br />

Shar<strong>in</strong>g e-mail accounts or passwords with others (or us<strong>in</strong>g poor password security)<br />

Handl<strong>in</strong>g messages <strong>in</strong>appropriately: forward<strong>in</strong>g e-mail messages to others,<br />

send<strong>in</strong>g replies to a group of recipients (“reply to all”)<br />

23.3 Issues <strong>in</strong> Physician–Physician and Physician–Staff<br />

Electronic Communication<br />

23.3.1 Technical Issues<br />

Secure e-mail communications between physicians (for patient-related matters)<br />

may be provided by a shared private network, provided by a common hospital, IPA,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!