@ShahidNShah
A student working on a Ph.d thesis on IT security sent me an email last night asking about interesting problems and industry directions for computer security in healthcare IT. He’s interested in applying his knowledge to this area and was asking specifically about privacy and confidentiality. I figured other students or readers might be interested in my answer so I’m answering the question here and others can comment if they can help out further.
In general, the answer to the security, privacy, and confidentiality lies somewhat in legacy software and a little bit in the US regulations for HIPAA. So, here’s a little rundown on HIPAA.
According to the American Health Information Management Association, an average of 150 people will have access to a patient’s private health information during a typical hospital stay of two to three days. Private, confidential health information can sometimes be released, shared or distributed without a person’s consent. Sometimes, the release is deliberate; other times, the release occurs due to poor security safeguards. The Health Insurance Portability and Accountability Act (HIPAA) was signed into law in 1996, in part, as a response to concerns regarding confidential health information. HIPAA ensures that those who have access to your health information are authorized and they will use it appropriately. HIPAA’s overall purpose is to:
How HIPAA changes things:
<th>
After HIPAA (assuming perfect implementation)
</th>
<td>
Basic privacy expectations are now standard across the board; everyone will protect health information to comply with certain federal minimum standards.
</td>
<td>
Standardized security procedures are now required.
</td>
<td>
Streamlined, more efficient systems for sharing electronic health information.
</td>
<td>
Improved communication and enhanced consumer service, for example, the coordination of health care benefits, will be easier.
</td>
| Before HIPAA |
|---|
| Privacy procedures regarding a person’s health information were often inconsistent from state to state. |
| Security procedures regarding how to protect health information were inconsistent. |
| Lack of standard data formats made sharing health information cumbersome and inefficient. |
| Communication was difficult. |
HIPAA is supposed to affect almost everyone. HIPAA applies to three fundamental types of organizations that collectively are referred to as Covered Entities, as they must comply with HIPAA. These Covered Entities are:
Who is Covered – Examples
Who is Not Covered – Examples
Even though these organizations are involved with healthcare, since they do not pay for healthcare, provide healthcare, or process healthcare information, they are not considered Covered Entities:
Privacy and Security Require System Modernization
HIPAA has detailed rules regarding:
What is covered
HIPAA does not protect all health information, only information in the hands of a Covered Entity or covered program which is integral to its activities as a Covered Entity or covered program.
Protected Health Information
The HIPAA privacy rule covers and sets standards for the collecting, sharing and storing of a person’s Protected Health Information, or PHI, for short. PHI is information that:
The privacy standards describe which health information about individuals is protected and the determination of who is permitted to use, disclose, or access that information. HIPAA sets procedures for the following privacy areas. Patients will have the right to obtain and amend their PHI to:
So where’s the work?
Almost everywhere. Most legacy and even systems in current use were written before HIPAA was passed and many of its requirements made it into law. Even though most of the regulations in HIPAA do not discuss privacy and confidentiality specifically in electronic systems, many of its provisions can not be met in any reasonable way (based on cost and time) without electronic tracking systems. So, there is plenty of opportunity to create solutions that track the information, that wrap the information as it’s being transferred, that audit systems to ensure compliance, etc.
Ultimately, the answer is that patients want complete privacy and confidentiality of their records, even if 150 people are authorized to see their data. The challenge is to meet the privacy demands in current systems without throwing out everything and starting from scratch.
Shahid Shah is an internationally recognized enterprise software guru that specializes in digital health with an emphasis on e-health, EHR/EMR, big data, iOT, data interoperability, med device connectivity, and bioinformatics.
Connecting innovation decision makers to authoritative information, institutions, people and insights.
Medigy accurately delivers healthcare and technology information, news and insight from around the world.
Medigy surfaces the world's best crowdsourced health tech offerings with social interactions and peer reviews.
© 2025 Netspective Media LLC. All Rights Reserved.
Built on Mar 12, 2025 at 5:07am