Authors:
Heitor Gottberg
and
Ivan Torres Pisa
Affiliation:
Federal University of São Paulo (UNIFESP), Brazil
Keyword(s):
Information Security Guidelines, Information Storage and Retrieval, Computer Security, Information Management.
Related
Ontology
Subjects/Areas/Topics:
Biomedical Engineering
;
Cloud Computing
;
Confidentiality and Data Security
;
e-Health
;
Health Information Systems
;
Hospital Management Systems
;
Platforms and Applications
;
Telemedicine
Abstract:
With the increasing use of electronic healthcare records and other medical systems, private and confidential information are electronically stored on different databases in several computers. A new set of processes and controls are necessary to assure the information system security and personal privacy. One of the approaches to meet these demands is to establish information security practices based on international standards. Due to the complexity of healthcare operations, managers must be aware that there are additional complexities on implementing those practices. This article depicts these additional efforts, highlighting four of the extra controls that shall be implemented: disposal of media, clock synchronization, backup, and network services – as well as threats as repudiation, theft, and terrorism that must be taken into consideration by healthcare CIOs in order to become compliant to the information security standards and, therefore, fostering the use of IT on medical practi
ce.
(More)