telemedicine: safety and security
TRANSCRIPT
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
TELEMEDICINESAFETY AND SECURITY
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
OBJECTIVES
After this short presentation, the hospital Director will be able to:explain and discuss the definition of
TELEMEDICINE accurately.deliberate appropriately the concept of
safety and security of telemedicine.
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
TELEMEDICINE
• The use of medical information exchanged from one site to another via electronic communications to improve, maintain or assist patient’s status.
• A rapidly developing application of clinical medicine where medical information is transferred through the internet and other networks for the purpose of consulting and remote medical procedures or examinations.
• As simple as two professionals discussing a case over the telephone or as complex using a satellite technology and video conferencing to conduct a real time consultation between medical specialists in two different countries
• A care in a distance
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
“”
How safe are the patients’ information with TELEMEDICINE?
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
SECURITY OF TELEMEDICINE
• AUTHENTICATION• TRANSPORT
SECURITY• AUTHORIZATION• ACCESS CONTROL• AUDITING• PHYSICAL
SECURITY
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
1. AUTHENTICATION • Verify the identity of
the user through UserID and Password
• Securing access only to allowed personnel
• And to access only the allowed information to be viewed.
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
2. TRANSPORT SECURITY
• Secured exchange of information over the internet.
• Data is encrypted• Keeps data safe and
confidential even if unauthorized access occurs.
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
3. AUTHORIZATION
• Verifying if the user has rights/permission to access the information
• Individual can access the file and patient’s dependents can access patient information on the rights given.
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
4. ACCESS CONTROL
• Limits access to specified data.
• Users are granted access and certain privileges to the information or data. • Privileges to:
Read data Edit data Delete data Add data
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
5. AUDIT CONTROL
• Logs or records of computer access. • It is done to identify inappropriate or unauthorized access
•• Recorded information include:
User IP Address Patient Data Type Access Type Type of Access
• This is one way to monitor inappropriate access
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
6. PHYSICAL SECURITY• Addresses actions you can take to
protect the data from intruders by: Housing all servers containing
valuable data in a main computer facility.
Staff should be present 24 hours per day,
Must be secured with biometric access controlled devices.
Installation of unauthorized software is prohibited.
05/03/2023 LEILLOSA G. TOM
ELDEN, RN, MAN
TELEMEDICINE…KEEPING YOUR DATA SECURED