11.07.2015 Views

Medical Records and the Law

Medical Records and the Law

Medical Records and the Law

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Specific Electronic Health <strong>Records</strong> Security Issues 509hold e-mail accounts make it difficult to rely on an e-mail address inorder to validate identity.The identity au<strong>the</strong>ntication requirements imposedon covered entities by <strong>the</strong> Security Rule require continuously secureau<strong>the</strong>nticating methods.Moreover, if <strong>the</strong> healthcare organization makes use of <strong>the</strong> Internetto exchange patient-identifiable information, healthcare informationmanagers should devote special attention to security weaknesses associatedwith <strong>the</strong> Internet. Finally, one o<strong>the</strong>r concern related to Internetuse is <strong>the</strong> potential for introducing computer viruses <strong>and</strong> o<strong>the</strong>rcomputer contaminants into <strong>the</strong> organization’s computer systems <strong>and</strong>networks.The need for network security does not apply to <strong>the</strong> healthcare industryalone, however; many industries now rely on <strong>the</strong> Internet forcommercial purposes. Therefore, a growing dem<strong>and</strong> exists for techniquesto secure information relayed in transactions over <strong>the</strong> Internet.Accordingly, health information managers should become knowledgeableabout such techniques, including <strong>the</strong> establishment of st<strong>and</strong>ardsfor encryption of documents as well as choices of software <strong>and</strong> hardwarefor user au<strong>the</strong>ntication.The HIPAA Privacy <strong>and</strong> Security Rules will likely apply to PHImaintained on, <strong>and</strong> transmitted through, <strong>the</strong> Internet by a covered entity.In addition, as states update <strong>the</strong>ir health information privacy laws,individually identifiable health information on <strong>the</strong> Internet will becomesubject to state law. Thus, sending sensitive health information such asthat concerning HIV testing, genetic counseling, mental health, <strong>and</strong>substance abuse over <strong>the</strong> Internet may be inadvisable. Such informationis given special protection under some federal laws <strong>and</strong> many state lawsthat contain provisions likely to preempt even those of <strong>the</strong> Privacy Rule.Therefore, healthcare organizations must implement measures to ensurenetwork security <strong>and</strong> <strong>the</strong> confidentiality of patient medical records.Most healthcare organizations already have implemented comprehensiveinformation security programs, in which case many of <strong>the</strong> policies,training procedures, <strong>and</strong> controls will be in place to address Internet informationsecurity risks. Because <strong>the</strong> Internet is changing so rapidly,however, health information managers should continually review informationsecurity measures to ensure sufficient protection of healthcareinformation; an organization-wide information security programshould facilitate ongoing attention to this objective.Liability risk relating to privacy <strong>and</strong> confidentiality can be managedin part through appropriate patient authorizations, toge<strong>the</strong>r with

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!