33
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Privacy and security of patient data in the pathology laboratory

      review-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

          Related collections

          Most cited references89

          • Record: found
          • Abstract: not found
          • Article: not found

          US Department of Health and Human Services

            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            mHealth data security: the need for HIPAA-compliant standardization.

            The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
              Bookmark
              • Record: found
              • Abstract: found
              • Article: not found

              Security and privacy issues with health care information technology.

              The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.
                Bookmark

                Author and article information

                Journal
                J Pathol Inform
                J Pathol Inform
                JPI
                Journal of Pathology Informatics
                Medknow Publications & Media Pvt Ltd (India )
                2229-5089
                2153-3539
                2013
                14 March 2013
                : 4
                : 4
                Affiliations
                [1]Department of Pathology, University of Pittsburgh Medical Center, Pittsburgh, PA
                [1 ]Department of Pathology, University of Pittsburgh Medical Center, Information Services Division, Pittsburgh, PA
                [2 ]Department of Pathology and Laboratory Medicine and Biomedical Informatics, Emory University School of Medicine, Atlanta, GA
                [3 ]Department of Pathology, University of Michigan, Ann Arbor, MI
                [4 ]Department of Pathology and Laboratory Medicine, Division of Pathology Informatics, Henry Ford Hospital, Detroit, MI
                Author notes
                [* ]Corresponding author
                Article
                JPI-4-4
                10.4103/2153-3539.108542
                3624703
                23599904
                57306257-5ad4-4453-be39-16d0fd1f43c4
                Copyright: © 2013 Cucoranu IC.

                This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 27 December 2012
                : 05 February 2013
                Categories
                Review Article

                Pathology
                antivirus,audit,biometrics,data backup,data integrity,encryption,firewall,health insurance portability and accountability act,internet,password,privacy,security,spyware,virtual private networks

                Comments

                Comment on this article