emails. This assurance can become critical on flows
of personal health information from one provider to
the other and/or on investigations of medical practice
(ISO/TC215, 2006).
Theft
: Theft of data and equipment is a serious
problem in hospitals. Theft may cause breaches of
confidentiality, either because confidential data
resides on a server or laptop computer that is
subsequently stolen or, else because the data itself is
the target of the theft. The threat of theft personal
health information increases with the fame or
notoriety of the data subject (e.g. a celebrity or head
of state) and decreases with the potential severity of
punitive consequences - e.g. the loss by a physician of
his or her license to practice (ISO/TC215, 2006).
Terrorism
: Even having no notice of wide terrorist
acts to healthcare institutions, once the healthcare
infrastructure is usually part of the national or
regional community sustainability infrastructure, once
large scale health information systems are planned,
the terrorist threat must be assessed due the possible
effects on increased effectiveness of bioterrorist and
other attacks that cause a health-related crisis
(ISO/TC215, 2006).
5 CONCLUSIONS
From the exposed above, we explain that the
establishment of an information security
management system, compliant to international
standards, gains complexity and scope extent when
we are in a healthcare organization. This statement is
reinforced by the existence of a technical committee
within ISO to study the specificities of the use of
informatics by healthcare service providers – the
ISO TC 215 – and within this group, a subgroup
focusing the information security needs.
On the other hand, this additional complexity is a
price to pay for the benefit of converting the patient
information to an electronic form and so have the
possibility of storing, retrieving, and distributing this
information in an easier, faster, and cheaper way.
We must remember that provisioning healthcare
services itself is one of the most complex duties in
terms of managing the needs and legal regulations of
integrity, confidentiality, and availability of patient
information. Therefore, the additional tasks that
come with the informatization of these data are a
natural consequence of its nature.
This work will now continue in two steps. First we
will try to identify the existing and used tools to
implement the information security controls (e.g.
standards toolkits and risks assessment tools).
Second we will move on trying to map and score
how compliant are healthcare organizations in our
region to the international standards that are
suggested by the Brazilian National Council of
Medicine to allow the migration of hospitals to full
electronic healthcare records.
ACKNOWLEDGEMENTS
We thank Mrs. Beatriz Leão (SBIS - Brazilian
Association for Health Informatics) for supporting
the development of this paper.
We thank also CISCO do Brasil Ltda that is
supporting the participation of the main author at
HealthINF 2008.
REFERENCES
Cavalli, E, et al, 2004; Information security concepts and
practices: the case of a provincial multi-specialty
hospital; International Journal of Medical Informatics
(2004) 73, 297-303.
ISO, 2005; ISO/IEC 17799:2005 Information technology -
Security techniques - Code of practice for information
security management; International Standard
Organization.
Yip, F, et al, 2006; Enforcing business rules and
information security policies through compliance
audits; IEEE 1-4244-0176 - 03/2006.
Ravera, L, et al, 2004; Security and privacy at the private
multispecialty hospital istituto clinico humanitas:
strategy and reality; International Journal of Medical
Informatics (2004) 73, 321—324.
ISO TC 215, 2000; ISO/TC 215 business plan template;
International Standard Organization – Technical
Committee 215 – Health Informatics (extracted from:
http://isotc.iso.org/livelink/livelink/fetch/2000/2122/6
87806/ISO_TC_215__Health_informatics_.pdf?nodei
d=1001750&vernum=0; in Feb, 24th, 2007).
ISO TC 215, 2006; ISO/Draft of international standard
27799: health informatics — security management in
health using ISO/IEC 17799, ICS 35.240.80; 2006;
International Standard Organization – Technical
Committee 215 – Health Informatics.
Posthumus, L., 2004; Use of the ISO/IEC 17799
framework in healthcare information security
management; Stud Health Technol Inform. 2004,
103:447-52 (PMID: 15747954).
Hoffman, S.; Podgurski, A., 2006, In sickness, health, and
cyberspace: protecting the security of electronic
private health information; Social Science Research
Network Electronic Paper Collection
(http://ssrn.com/abstract=931069).
HEALTHINF 2008 - International Conference on Health Informatics
208