Overview of Healthcare
Overview of Healthcare
172
L. Janczewski & F.X. Shi
Development of Information Security Baselines
7799 as the standard was developed later (in the government data collection, could threaten
mid 90s). An example of a similar project from patient privacy [Hill 1998]. Privacy and security
the Southern Hemisphere could be a project assurances from hospitals and government
described in [Janczewski 2000]. health agencies are not enough to satisfy 61% of
surveyed doctors. Because of the special features
Overview of Healthcare of health information (e.g. confidentiality of
Information Systems in New collection, sensitivity of information, multiple
Zealand users, duration of retention), New Zealanders
accord a high priority to the confidentiality and
The current healthcare industry in New
privacy of their personal health information
Zealand is characterized by a large number of
[Tan and Gunasekara 2000]. New Zealand has
separate service organizations (e.g. public,
issued a code of practice, the Health Information
private and voluntary healthcare providers),
Privacy Code 1994, specifically to protect the
which are commercially separate but
privacy of personal health information. The
functionally dependent in providing an
essential elements for protecting the privacy of
integrated service to all New Zealanders. In the
personal health information are contained in
past three decades, there has been a continuing
the Code in 12 health information privacy
drive for improvements in the quality and cost-
rules, outlined in Appendix A.
effectiveness of healthcare industry, to which
information infrastructure is poised to make a There are many offshoots of the worldwide
major contribution. By nature, healthcare acceptance of the BS 7799 standard. One of the
organizational structure in New Zealand is best-known projects is the development of an
distributed (being a geographical spread of Information Security Toolbox at PE Technikom,
centres at different levels of complexity) from Port Elisabeth, South Africa [von Solms 1999
the general hospitals down to individual general and 2001]. The Toolbox is a system tool that
practitioners (GP). Therefore, from a national helps IS managers assess their installation from
perspective, healthcare information systems for the viewpoint of adherence to the BS 7799
patient information have been traditionally standard.
associated with medical centres, hospitals, or
government agencies [NZHIS 1997]. Currently Information Security Baseline
however, the healthcare sector is moving Approach
toward linking these institutions through a
proposed information network and The accepted solution to introduce security in
communications networks. Architecturally, this an IT environment is to identify, introduce and
national information network ressembles the maintain an effective set of security controls in
World Wide Web, where a set of discrete and the organization [Barnard and Solms, 2000].
autonomous HIS interact to provide access to Identifying the most effective controls has
patient information. Its objective is to make all always been a problem and many approaches
information (which in many cases already exists and techniques have been developed over time
in today’s HIS) readily available, in order to to work on it in the most objective way as
provide coordinated and integrated care and possible. Risk analysis is probably the most well
treatment for New Zealanders. known approach in this regard, even though it
is usually a very complex and resource intensive
Results from the 1998 IMS/New Zealand
process. Baseline approach has gained a lot of
Doctor poll show 84% of surveyed GPs believe
support in New Zealand and some of the
that the latest developments like hospital and
baseline manuals, for example the Code of
sector-wide intranets, centralized databases, and
173
L. Janczewski & F.X. Shi
Development of Information Security Baselines
174
L. Janczewski & F.X. Shi
Development of Information Security Baselines
environment. Consequently, both the inherent To encourage personnel at the various sites to
deficiencies with the existing standards and the share their experiences candidly, the study
unique features of healthcare environment decided to keep the identities of the sites
necessitate an amendment of the standards confidential by naming them Hospitals A, B, C,
when applied to healthcare organizations. These and Labs D and E in the paper.
were the foundation of the research presented
During the site visits all types of employees
in this paper.
were interviewed, including HIS staff, and
Value of BS 7799 has been confirmed by the others such as workers of healthcare
fact that recently the standard has been information management (i.e., medical
recognized as an international standard ISO records), human resources, public relations, and
17799 by the International Standards where possible, doctors and other system users.
Organization. As a result, during 2000, the Additionally, contacts have also been made
AS/NZS 4444 has been upgraded and re- with the officials from the New Zealand Health
branded as AS/NZS ISO/IEC 17799 Information Service (a department of the
Information Security Management Standard Ministry of Health responsible for the
[Mason 2001]. However, to maintain development and maintenance of nation-wide
consistency with the original research, in this health information network and standards) and
text the old name of the standard (AS/NZ Health Funding Authority (a New Zealand
4444) is retained. Government’s unit responsible for distribution
of funds for research and development projects
Research methodology in the healthcare domain). The study was
To conduct the research, a search of academic conducted through relatively formal interviews,
and practical periodicals and Internet materials informal correspondence, telephone interviews,
was carried out in an attempt to locate any and email exchanges, in order to collect
research into the healthcare information comprehensive information. Then, the
systems security, health privacy legislation and collected original data were processed and used
AS/NZS 4444. The implementation side of this in reviewing and amending the criterions of
study is done through a comprehensive AS/NZS 4444, based on which the information
questionnaire that addresses issues in 10 security security baselines applicable to the healthcare
areas based on the clauses of the Standard. The sector are developed.
primary mechanism for gathering information We need to explain the reasons why our study
about technical and organizational approaches was limited to visiting only three hospitals and
to protecting electronic healthcare information two diagnostic labs. Despite its size (New
consisted of a series of site visits to five Zealand: 270 0002 km v UK: 244 0002 km) the
healthcare organizations at Auckland, New population of New Zealand is small (3.9
Zealand, which run extensive HIS. The sites million), and concentrated in major towns.
were selected on the basis of their reputed Well over 1 million people live in Auckland
leadership in the development of electronic and its surrounding regions. By visiting three of
medical records, networked clinical systems, the biggest public hospitals in the region, we
and privacy and security policies. The selected practically covered almost a third of the
sites include three general public hospitals and population of the country. Private hospitals do
two diagnostic laboratories, which, on the exist in Auckland but their size is (with only
whole are fairly representative of the large and one exception) small in comparison with the
medium-sized care-providers in New Zealand. public hospitals. On the other hand, all the
175
L. Janczewski & F.X. Shi
Development of Information Security Baselines
176
L. Janczewski & F.X. Shi
Development of Information Security Baselines
177
L. Janczewski & F.X. Shi
Development of Information Security Baselines
management to commit to information security the security of systems and the privacy of
forum, need of coordination of information health information.
security efforts from all the divisions of the • More external security advice, cooperation
HCO, need of clearly defined responsibility of and review. Contacts with external security
security and information ownership, lack of specialists should be developed in the HCO
external security advice, cooperation and review to work along with in-house IT personnel in
to the HCO, and weaknesses in security of third order to keep up with industrial trends,
party access and outsourcing. According to all monitor standards and assessment methods,
these problems found in the research, some and provide suitable liaison points when
recommendations for modifying the criteria in dealing with security incidents. Meanwhile,
the section of Security Organization in the the cooperation on the security issues
Standard are made as follows: between different HCOs should be
encouraged and strengthened.
• Getting support from senior executives for
• Establish the chain of Trust Partner
information security forum. One of the most
Agreements. If data are processed through a
critical components of an effective
third party, the parties are required to enter
management information security forum is
into a chain of trust partner agreements.
ongoing support from senior executives in
Ensuring that the same level of security will
the HCO. This support translates into
be maintained across the continuum of EMR
organizational commitment for almost every-
transmission, a chain of trust partner
thing, from effective security policy, budget
agreements should be instituted between
development, to personnel training time.
HCOs and those third parties with whom
• Clearly define responsibility of security and
electronic health information is exchanged.
information ownership. The security of the
Such contracts will provide the legal basis
HIS and EMR should be the responsibility of
for maintaining consistent levels of data
the owner of that system and information. It
integrity and confidentiality.
is essential to clearly define the ownership of
• Careful identification of risks from third
health information and the local responsibil-
party access and outsourcing. While there
ities for both physical and information assets.
are many reasons (administrative, research,
Owners of HIS and EMR, e.g. HCOs and
and business ones) for granting a third party
patients, may delegate the security authority
the right to access IT facilities and patient
to individual users; e.g. doctors and nurses,
records in a HCO, a risk analysis should be
managers, and IT experts. Nevertheless, they
carried out to identify any requirements for
remain ultimately accountable for protecting
specific security measures. The analysis
Figure 1 should take into account the types and rea-
sons of the access, the classification of acc-
essible information, the controls employed
by the third party and implications of this
access to the information security of the
HCO.
178
L. Janczewski & F.X. Shi
Development of Information Security Baselines
there are increasing uses of HIS and EMR both • Establish centralized inventory management
within and outside the organization in the of assets. The HCO should establish
recent years. All the interviewed HCOs did a centralized inventory management of all
pretty good job in the inventory of physical and assets categorized by enhancing the
software assets. Each department in the public cooperation and coordination of asset
hospitals is responsible for the usage and management across the organization.
maintenance of its own hardware and software, Adequate precaution against damage or
while the relatively small diagnostic labs usually unauthorized entry to places where health
have the centralized inventory management of information is centrally stored is essential.
their assets. Health information, like other • Develop scheme and policies for health
information assets in a HCO, has varying information classification. The policies of
degrees of sensitivity and criticality. There are the HCO with regard to the classification of
certainly many classification schemes of health health information on the basis of its
information, one of which suggested by the sensitivity and patient-identifiably should be
authors may divide the information into four defined. The classification categories should
categories (see Figure 1) also be consistent with legal requirements
and sector standards. In addition, care must
Obviously, specific security controls and
be taken to protect the anonymity of
guidance should be set for each of these
patients during software demonstrations to
categories respectively. For instance, the first
colleagues. Use fictitious names or non-
category of health information covers the most
identifiable data for presentations. Patient
sensitive information at the HCO and requests
records used for education and training
the greatest security safeguards at the user level.
should be de-identified.
To the second and third category, a record of
electronic access to patient-specific information Personnel security
should be logged. They should be protected The major security weakness of most HISs is
against acts that are considered to be malicious not the technology but the people involved.
and destructive. Finally, in the last category, the Many reports indicate that danger of an
information could be used by researchers and internal security attack (i.e. an attack initiated
other authorized personnel with the minimum by their own employee from within the
of protection. company) is very high, at present around 50%
[CSI/FBI 2001]. All healthcare professionals
To summarize the findings, in practice, the vul-
and other employees in a HCO should be
nerabilities in the area of asset classification and
adequately screened at the recruitment stage,
control may include lack of centralized control
and their responsibilities on information
on the asset management across the organiza-
security and patient privacy should be included
tion; a need to clearly define the ownership of
health information assets and custodian respon- in the job contracts and monitored during their
sibilities for these assets; lack of unique employment. They should also be trained,
standards for health information classification; through the HCO, in the principles and
the need of procedures for information labelling practices of healthcare information security,
and handling in accordance with the given the rapid development of EMR and HIS.
classification scheme. To overcome these During the site visits, all the HCOs interviewed
problems found in the research, some claimed to have the strict verification checks
recommendations specific for HCOs in the on the potential recruits. The procedures are
criteria of asset classification and control are usually tougher than many other recruitments,
presented as follows: because a HCO employee may get access to
179
L. Janczewski & F.X. Shi
Development of Information Security Baselines
confidential health information and systems, According to the above problems found in the
and therefore have more responsibilities on research, some recommendations for improving
information security and patient privacy. In the area of personnel security in the HCO are
addition to informing employees of the presented as follows:
organization’s expectations with regard to
• Establish a comprehensive set of personnel
keeping health information confidential,
security policy. According to the experiences
organizations need to hold them responsible for
of other industries, for e.g. banking, a formal
their behaviour. As to personnel security policy,
personnel security policy that support
however, only one out of all five HCOs
privacy and confidentiality is also a critical
interviewed (hospital B) has developed the
component of the HCO’s information
formal documents in this area. And there was
security infrastructure. The major contents
little implementation or use of termination
may include: a statement of purpose;
security found in the HCO in practice.
references to relevant institutional policies
Information and system security can only be concerning access to personal health
maintained if all personnel involved in their use information and general information
know, understand and accept the necessary security; a definition of confidential
precautions. Most large HCOs (hospitals A, C, information, including patient, business, and
and lab D) claimed to have formal seminars or employee data; responsibilities of employees;
programmes to educate employees about patient responsibility and procedures for reporting
privacy and system security. Many provide such security incidents and violations;
training in an orientation session before they investigation and appeal processes; and
are given access to patient information. consequences and penalties for inappropriate
Similarly, refresher courses serve to remind access, release, modification, or removal of
long-time users about existing policies, update patient health information.
them on changes, and discuss strategies for real- • Develop the appropriate termination proced-
life situations that they may encounter on the ures. Each HCO is required to implement
job. Mistakes and incidents in HCOs are killing termination procedures, which are formal,
1500 people a year, according to a research documented instructions (including appro-
paper dated 4 October 2000 by Martin priate security measures) for the ending of an
Johnston, a health reporter of the New Zealand employee’s employment or an internal/exter-
Herald [Johnston 2000]. Many of the incidents nal user’s access. Included in the termination
are IT-related, including errors in EMR, procedures should be provisions for:
negligence by individuals or HIS failures. four of changing locks or combinations to protect
the five HCOs interviewed (hospitals A, B, C, IT facilities or HIS; removal from access
and lab E) stated that they had implemented a lists; removal of user accounts granting
formal process to deal with identification, access privileges to patient information,
reporting, and the ensuing response to real or services and sensitive systems for which they
potential violations of established security currently have clearance; and turning in of
policy, including security incidents, weaknesses keys, tokens or cards that allow access to
and malfunctions of IT facilities, even though buildings or equipment, preferably prior to
the reporting and response procedures of termination;
security incidents in some organizations were • Develop the organization-wide security
still conducted on an ad hoc basis, with no training programme. A security training
formally documented and communicated steps programme should be established in the
to be followed. HCO for all employees and third parties
180
L. Janczewski & F.X. Shi
Development of Information Security Baselines
with access to health information. Such security practices. The machines that provide
training should include: awareness education centrally controlled services — mainframes and
covering the organizational security policy, other production servers — were identified,
password maintenance, incident reporting, located in very secure settings, and well
and viruses; periodic security reminders controlled at the sites visited. Most of the
conducted as updates to the basic security organizations put much effort in the protection
education; user education concerning virus of their IT facilities in order to reduce the risk
protection, including identification, of unauthorized access to sensitive health data
reporting and prevention measures. and to safeguard against loss or damage. Servers,
• Make use of multiple training tools. routers, network cable and some support equip-
Innovative training methods have been ment are usually key targets under security pro-
evaluated in studies dealing with changing tection. Many protective measures, such as fire
clinical practice behaviours and may be of and smoke detectors, gutters and down pipes,
use for training in confidentiality and UPS and multiple electrical power suppliers,
security as well. A variety of tools may be have become the standard associated facilities
developed to support or enhance formal for computing sites of more and more HCOs.
training programmes. These include Compared to large organizations, the smaller
attractive pamphlets, enhancements to ones may face even more challenges in physical
computer systems, self-study modules security. Police statistics show that more than
available for use in the computer training 10% of GPs in New Zealand have had their
centre which they can take home, and computers stolen and other hazards include
posted reminders in elevators and cafeterias. excessive heat, dust, fire and lightning [Hill
• Develop the patient education based on legal 1998].
requirements. Based on the requirements of
the Privacy Code, the patient must be at the To summarize the findings in the practices,
centre of the decision-making process the vulnerabilities in the area of physical and
regarding access to, storage and disclosure of environmental security could include lack of
his or her own identifiable healthcare formal physical security policy, the need of
information. The HCO should provide a full scientific decision-making procedure of
explanation to the patient of both the health physical security, inadequate coordination in
information or medical record and his/her the implementation of physical controls, the
privileges in dealing with the information. weaknesses in logical access controls and
equipment disposal. Some recommendations
Physical and environmental security
for optimizing the physical security in a health
The generally open nature of HCOs and their
IT environment are made as follows:
high degree of public access dictate that
physical security measures are the very first • Establish appropriate physical security poli-
stage of protection to prevent unauthorized cies. Management should establish rules and
access to computing equipment and facilities. procedures to ensure that all staff maintain
The information systems must also be a secure work area; i.e., one in which
safeguarded against a variety of environmental physical security helps to protect the
hazards that may adversely affect the operation confidentiality and privacy of health
and management of these systems. All of the information. For instance, computer screens
HCOs visited were found to have moderate on the consultation desk should not display
physical security in place for their information patient information from previous
systems; two of them had somewhat stronger consultation. The use of screen savers and
181
L. Janczewski & F.X. Shi
Development of Information Security Baselines
automatic time logout can assist with of systems applications. All have local area
protection of privacy. networks as well as wide area networks that
• Optimize the decision and implementation span different buildings at the same location as
of physical security. A good physical security well as those over different geographic
management also needs a scientific decision- locations. These hospitals operate a wide variety
making mechanism. The level of physical of hardware, running multiple operating systems
access control for any area containing such as Unix and Windows NT as servers.
confidential or restricted health data and Servers form the backbone of the network
facilities must be consistent with the level of system, providing files and database access.
risk and exposure. Meanwhile, the Each server may provide one or more services,
implementation of physical security controls such as patient information, payroll, billing, test
should depend on the coordination of all results, and administration. Meanwhile, a
divisions of the HCO, including the security, variety of communication technologies like
IT and clinical departments. X.25, ISDN, microwave and optical fibre have
• Strengthen the security of computing equip- been deployed. These technologies enable
ment. Servers, routers, and other equipment, internal network connection within the
which contain or communicate patient organization as well as allowing other organiza-
information, must be protected from damage, tions, e.g. diagnostic laboratories, GPs, and
theft, and misuse — and not only because of government agencies, to exchange information.
their monetary worth. There are many ways
Concerns about computer and network security
to provide equipment control. These may
have been voiced for decades in the healthcare
include assignment of liability, property pass,
sector, like most other sectors, and the proce-
desktop lock, and property alarm device.
dural and technological solutions have been
Facility security may include access cards,
worked out for all but the most assiduous kinds
cipher locks or just a lock on the door.
of attacks. More recently, with the growth of
• Carefully deal with information and equip-
the Internet and distributed computing, these
ment disposal. Physical security also
issues have been felt more widely, and a whole
requires that outdated IT facilities, which
new class of problems centred on powerful new
contain sensitive personal health
means of remote access to HIS, and their
information, be disposed of properly. Paper
networks of all kinds, has raised additional
records are best disposed of by shredding.
security challenges. Again procedural and
This applies to copies of test results and
technological solutions have been devised that
brief notes. Electronic records disposal may
offer prudent protection but recognize that
be either done through physical methods,
concerted, directed, professional attacks on
e.g. CD-ROM destruction, or electronically
almost any computer and network facilities are
through magnetic erasure (floppy and hard
likely to succeed, despite the most rigorous
disks).
protection. However, these ‘prudent practice’
Computer and network management solutions have not been adopted uniformly,
The computers and networks implemented in partly because the number of affected computers
the surveyed HCOs are of different models from and networks in HCOs have grown
different companies. But their architecture and exponentially and partly because people
management in the same types of care-provider responsible for these systems are not trained to
are quite similar. For example, in the three select and apply these solutions, or are unable
public hospitals interviewed, they all make use to enforce workable solutions within the
of the client/server architecture with a variety organization. To summarize the findings in the
182
L. Janczewski & F.X. Shi
Development of Information Security Baselines
practices, the current state problems in the area requested software services in a healthcare
of computer and network management during environment.
the research include unclear segregation of • Data backup in a network environment.
duties in IT professions, lack of integrated Some of the issues for making the data
system planning management, the need of backup work well in a HCO network
comprehensive software disciplines, issue of environment should be considered. Backup
software availability, ignorance of data backup data should be stored in a secure location
in a network environment, lack of the formal other than the HCO. Paper records should
policies for health data handling process, and not be kept in a public area but in a lockable
the security weaknesses of the applications of area when the staff is away.
email, HL7 and Value Added Networks, • Establish the mechanism of network
Internet, etc. in a health environment. In fact, management. The network management in
many of the above problems have not been the HCO should be an integrated process
described clearly in the criteria of the Standard. including at least the following steps: risk
Therefore, some suggestions for modifying the analysis, identification of security
criteria in the section of Computer and requirements, establishing security
Network Management in AS/NZS 4444 are mechanisms regulations, selecting network
made as follows: security controls, and installation and
maintenance.
• Establish integrated system planning • Develop a formal health data handling
management. The planning policies and
process. HCOs should maintain a formal
procedures for system development should be
mechanism for processing records, that is,
established in HCOs to reduce the risk of
documented policies for the routine and
system failures due to the problems of system
non-routine receipt, manipulation, storage,
capacity, integration, interconnection,
dissemination, transmission, and/or disposal
feasibility and growth.
of health information, according to the rules
• Comprehensive software disciplines for
of Privacy Code.
security. HCOs should exercise and enforce
• Develop security policy on email. HCOs
comprehensive disciplines over user software.
should draw up a clear policy regarding the
At a minimum, they should immediately
install virus-checking programs on all servers use of electronic mail, which may cover the
and limit the ability of users to download or guidelines on the sensitive contents (e.g.
install their own software. Census software personal health information) in the
or regular audits can be used to ensure messages, the protection and check of email
compliance with such policies. attachments, the knowledge of attacks on
• Availability of software services. The email, the use, storage and disposal of email,
availability of the software services in the etc.
HIS ensures that accurate and up-to-date • Health Level 7 (HL7) and value added
health information services are available to network (VAN). The issues of Health Level
end user (e.g. doctors and nurses), when 7 and value added network should be studied
needed, at appropriate places. There are four and implemented by each HCO, which has
main components which support the health data exchange with outside parties.
software availability, namely, application All the sensitive healthcare messages sent
software, network systems, client computers should be encrypted or scrambled at one
and server computers. [Sakamoto 1998] end, decrypted at the other and receipt
suggested a prototype to structure these four acknowledged — this is achieved by using a
components so as to provide the minimum VAN.
183
L. Janczewski & F.X. Shi
Development of Information Security Baselines
• Build Internet and E-commerce security policies and practices; and lack of access
solutions. Internet services, as well as E- controls to mobile computing and telemedicine.
commerce, in health provision is vulnerable According to these problems found in the
to a number of network threats which may research, some recommendations for improving
result in fraudulent activity, contract dispute the area of system access controls in the health
and disclosure or modification of sensitive computing environments are presented as
personal health information. The follows:
appropriate security solutions should be
• Establish the appropriate rules for access
applied to protect Internet services from
controls. The appropriate rules provide the
such threats.
basis for access control policy in an
System access control organization. Generally, the access rules in a
It is essential that IT systems and health HCO should be based on the principles of
information be protected by comprehensive Privacy Code and the need-to-know
logical access controls implemented by the principle. And access is restricted to
HCO. Access should be guaranteed for healthcare professionals working within the
legitimate users (e.g. doctors and nurses) and HCO. EMR permit differential access to
denied to all others. All classes of users must be health information, which can be used as a
identified and authenticated before any access is tool to protect privacy.
granted and further mechanisms must control • Consistency between access control and
subsequent reading, writing, modification and information classification policies. All the
deletion of applications and data. There should HCOs are suggested to develop an
be no method for bypassing any authentication appropriate classification scheme of health
or access controls. HCO users are unlikely to be information (see the section of Asset
satisfied with controls that intrude upon Classification and Control) consistent with
working practices and the chosen schemes legal requirements and sector standards. E.g.
should be transparent and convenient in order access control lists should separate clinical
to gain acceptance. However, we found in the users from administrative users.
site visits that a serious threat to the security • Specifying Patient access in the access
and privacy of personal health information in control policy. Patients’ access right to their
HCOs is the poor design and lax administration electronic and paper health records are
of access control mechanisms. In many HCOs, protected by the Privacy Code. The HCOs
all users may access all medical records; it is also should include the patient access into their
common to find poor password management, or access control policy and specify its access
terminals permanently logged on for the use of process and procedure. Sharing information
everyone in a ward. This causes a breakdown of is integral to good communication in the
clinical and medico-legal accountability, and doctor patient relationship and to high
may lead to direct harm to patient’s privacy. quality care.
Vulnerabilities found in this area include ad hoc • Optimize the user authentication
practices, and/or incomplete policies and mechanism. The HCOs should optimize its
procedures for authorizing and establishing user authentication mechanism by
access to organizational systems; broken combining login-password authentication
processes to address modification and with the advanced authentication
revocation of user access following job changes technologies. Some potential candidates may
or termination; failure to include smaller, include biometric identifiers (e.g. fingerprint,
departmental applications in access control hand geometry pattern, retinal scan,
184
L. Janczewski & F.X. Shi
Development of Information Security Baselines
voiceprint, etc.) and smart card token. an issue to be considered. Security aspects
Specific policies within the organization range from confidentiality, correctness and
should specify the disciplinary actions and availability of information at the right time to
penalties for sharing any unique identifier the right person. Unauthorized or uncontrolled
with other individuals. changes to any aspect of an operational system
• Implement comprehensive network access could potentially compromise security and, in
controls. Effective access controls should be some cases, endanger life. The system develop-
a prerequisite for the HCO’s networking. ment and maintenance must, therefore, be
The network and system administers should carried out in accordance with well-defined
pay attention to combining the technical procedures. The major problems found in the
controls, e.g. firewalls, limited links, strong area of systems development and maintenance
authentication technologies and audit trails, during the site visits include lack of
with the non-technical approaches, e.g. documented process and policy of security
security trainings and ethical considerations. requirement specification during the system
• Establish network connection management development; the need of integration concerns
in HCO. HCO should establish appropriate of health system development; lack of system
connection controls to manage not only the quality assurance and data integrity mech-
links to the external networks but also the anism; the security weaknesses in system main-
contents of exchanging information. For tenance; and immaturity of the use of crypto-
example, the network should limit the trans- graphic technologies. We made some
ferring of sensitive patient health recommendations here for improving the
information without the protection of current situation in the HCO and modifying
encryption. the criteria in this area:
185
L. Janczewski & F.X. Shi
Development of Information Security Baselines
system for the quality assurance of system damage, minimize disruption, ensure stability,
development in the HCO. Strong controls and provide for orderly recovery. It is essential
must be placed upon the developers of HIS that business contingency plan (BCP) be made
to ensure high quality development, and to ensure the level of availability needed by
compliance with the security and privacy the HCO be maintained in the event of any
requirements should be expected as a system outage or disaster. There should be a
minimum. Effective software development reporting structure and a team in place to
tools must be used to design application ensure that the system outage is kept to a
systems. Maintaining separate hardware minimum. In the site visits, the majority of
domains for the operating system and large HCOs (hospitals A and C) already have
application programs is essential for the documented plans and procedures of
protecting critical code and data structures disaster recovery and data backup for physical
from external interference. disasters and systems failure. Compared with
• Develop comprehensive data integrity the large HCOs, the smaller ones (e.g.
measures for health application systems. The diagnostic labs and GP offices) were found to
HCO should develop a data integrity control be generally more lax in the business
policy, which has at least the process and continuity management. For example, only 5%
procedures of four essential components: sec- of GPs have contingency plans to deal with
urity measures, procedural controls, assigned any problems, according to a survey carried out
resonsibility, and audit trails [Anderson by the Ministry of Health [NZHIS 1997].
1996]. For example, to ensure the integrity of
Some other vulnerabilities in this area might
information, unauthorized, deliberate or
include the need of risk analysis and business
accidental modification or entry of data must
continuity and impact analysis during the
be prevented. Moreover, the source, date,
development of BCP, lack of BCP in effect in
time and content of any alterations must be
the small organizations, or some disaster plan in
known.
effect covering only major enterprise systems;
• Create security and privacy protection in
contingency plans left to the discretion of de-
system outsourcing. Outsourcing may lead to
partment managers to cover their departments,
reduction in security and privacy protection.
with no comprehensive plan in effect for the
The HCO should carry out the rigorous
entire organization; or contingency plans in
contract management through a formal set of
place that have not been updated recently and
outsourcing security policy and contractual
therefore fail to cover all parts of the
terms, which aim at extending privacy
organization, including remote sites, the need of
protection to patient information handled by
built-in BCP-compliant measure. According to
contractors. The organizations also pay
these problems found in the research, some
attention to any proposal involving off-shore
recommendations for improving the area of
processing as this may carry additional
business continuity management in the health
privacy risks.
computing environments are presented as
Business continuity planning follows:
The continuous availability of information
• Carry out business continuity and risk
systems is essential to the operation of a
analysis. The HCO should begin the
modern HCO. Many health IT departments
business continuity management by
never experience a disaster. But should a
assessing the sensitivity, vulnerability and
disaster occur, a well-designed action plan
security of the key business operations and
would protect health information from
health information assets in the
186
L. Janczewski & F.X. Shi
Development of Information Security Baselines
Figure 2
187
L. Janczewski & F.X. Shi
Development of Information Security Baselines
Figure 3
Information Privacy Code, which provide and to spread the awareness of privacy issues
adequate guidance on such issues in the health and with the support of management and IT
sector. One of the most important legislations staff, facilitate the privacy plan and codes
regarding health information privacy and throughout the organization.
security is the Health Information Privacy Code
One of the important tools to ensure
1994 (see Figure 2).
compliance with legislative and operational
In summary, compliance with the Privacy requirements in an organization is the system
Code and other relevant data protection audit trail. In a health IT environment, audit
legislation requires appropriate management trail records contain identification of the user,
structure and controls. Often this is best data source (for automated devices), person
achieved by the development and about whom the health information is
implementation of privacy plan and codes of recorded, provider facility, and other
practice, based on the privacy principles and participant users if applicable. Audit trail
legislative rules, in the HCO. Privacy officers records also contain the date/time and location
should be appointed to provide the guidance of the activity, and the nature of the activity
188
L. Janczewski & F.X. Shi
Development of Information Security Baselines
(i.e., function performed and information • Develop the Code of Practice for the
accessed). Some vulnerabilities in system audit management of health information. The
found in the site visits could include lack of HCO should develop the Code of Practice
internal audit capability in the organization for the management of health information,
(no internal audit department), constrained which aims to provide clear advice to all the
audit resources, or lack of skills to review audit internal users and other interested parties
logs generated from organizational systems; lack about the way in which health information,
of follow-up once irregular activities are particularly personal health information,
recognized; and lack of participation by the should be managed on an ethical and legal
internal audit staff in the design and planning basis. While privacy concerns have been
of systems that will comply with the security particularly highlighted by the advent of
policy; and inadequate or non-existent audit information technology and its capacity to
logs from one or more applications that process facilitate information transfer, this Code
health information. Some recommendations for should establish minimum safeguards and
improving the area of compliance in the health processes that must be followed by the users,
if their use of manual and computerized
computing environments are presented as
records is to meet appropriate legal and
follows:
ethical standards.
• Develop the constructive privacy plan.
Because there are so many dimensions of Developing a proposed
the patient privacy interest and so many Healthcare Information
competing interests of health information Security Framework based on
at so many levels of society, it is essential baseline approach
for a HCO to develop a constructive
Although most key controls in the 10 aspects
privacy plan based on the legislative
of the information security baselines described
requirements of the Health Information
in the last section were observed in at least
Privacy Code 1994.
one site visited, no other HCO had
• Establish the general principles of health
implemented all, and some had paid only
information privacy. Based on the 12 rules of
minimal attention to a few security measures.
Health Information Privacy Code 1994, the
From our point of view, they could have made
health sector in New Zealand should
significantly more effective use of current
establish a set of general principles that
technologies in practice. The HCOs that we
provide the guideline of protections, which
interviewed often demonstrated a lack of clear
should be considered when implementing
leadership on the part of security management,
comprehensive patient policies and codes of
thus employees were uncertain of what to do
practices. These principles should cover the
or where responsibility lay. Instances were
issues such as recognizing the unique status
observed in which managers had made isolated
of personal health information, providing
efforts to improve information security within
privacy safeguards based on fair information
their departments but without sufficient
practices, empowering patient with
authority and management support these
information and rights to consent, limiting
efforts remained limited in scope and had little
the disclosure of health data, incorporating
impact on the overall organization. Therefore,
industry-wide protections, establishing a data
as HCOs are becoming increasingly dependent
privacy and security board, and providing a
on IT and expanding their boundaries, they
minimum level of national privacy
need to develop a comprehensive framework to
protection.
189
L. Janczewski & F.X. Shi
Development of Information Security Baselines
190
L. Janczewski & F.X. Shi
Development of Information Security Baselines
information; Hill, S., 1998. GPs Say Data Transfer a Threat to Patient Privacy,
New Zealand Doctor, 19 August 1998.
• the consequences for the individual if the
ISHTAR, 2001, B. Barber, K. Louwerse, J. Davey, White Paper on
information is not provided; Health Care Information Security,
• the rights of access to and correction of http://ted.see.plym.ac.uk/ishtar/
personal information provided. Janczewski, L., 2000. Information Security Framework For Health
Information Systems, in A. Armoni, A. (ed.) Health-care
4. Personal information shall not be collected Information Systems: Challenges of the New Millennium,
by unlawful or unfair or intrusive means. Harrisburg, PA, USA, IDEA Group Publishing,
191
L. Janczewski & F.X. Shi
Development of Information Security Baselines
Johnston, M., 2000. Blunders kill hundreds in hospitals, The New Smith, E. and Eloff, J.P.H., 1999. Security in Health-care
Zealand Herald, 4 October 2000. Information Systems, Current Trends, International Journal of
Medical Informatics, Volume 54, Issue 1, April 1999, pp. 39-54.
Mason, A. and Tipping, L., 2001. Understanding & Implementing
Security Standards into Your Business, Proceedings of the SEISMED, 2001, Secure Environment for Information Systems in
SECURE.NZ conference, Auckland, New Zealand, 2001. Medicine Project, http://www.semper.org/sirene/
projects/seismed/
Moule, B. and Giavara, L., 1995. Policies, Procedures and
Standards: an Approach for Implementation, Information Tan, F.B. and Gunasekara, G., 2000. Health Information
Management & Computer Security, Vol. 3, No. 3, 1995, Management and Individual Privacy: Application of New
pp. 7-16. Zealand’s Privacy Legislation, Chapter IV of Health Information
Systems: Challenges of the New Millennium, edited by Adi
NZHIS 1997 NZHIS, Issues in Developing and Implementing a Armoni, Ideal Group Publishing, 2000.
Health Information System, New Zealand Health Information
Services, Ministry of Health, New Zealand, 1997. Von Solms, R., 1999. The Information Security Toolbox, in
Managing Information Technology Resources in Organizations in
OTA 1997. Office of Technology Assessment, Protecting Privacy the Next Millenium, ed M. Khosrowpour, Idea Group Publishing,
in Computerized Medical Information, report for US Congress, 1999.
OTA-TCT-576, September 1997.
Von Solms, et al., 1999. The Information Security Management
Sakamoto, N., 1998. Availability of Software Services for a Toolbox, Proceedings of the 1st Annual Information Security four
Hospital Information System, International Journal of Medical South Africa Conference, Rand Afrikaans University, August
Informatics, Vol. 49, 1998, pp. 89-96. 2001.
192