ity dectection that used the data from AT, which has
the users and systems activity logs. However, at this
point, we just had available logs from one applica-
tional system (Obscare) that were being collected to
HS.Register in a hospital from North Portugal. So
we developed three algorithms for suspicious activ-
ity dectection that could be tested. The results im-
mediately show that there are some aspects in com-
mon to the three analysis. There are events that do not
have the professional identification or category. This
actions are automatic processes running in system’s
background and all of them are classified as suspi-
cious in “Check time of activity” and “Check days of
activity” UC, because of their continuous behaviour
that exceeds the time limits imposed by algorithm’s
rules. For UC “EHR read access”, as it depends on the
type of action of the automatic processes, not all are
suspicious. Some are just to check information and
others update the EHR. Being automatic processes
they probably do not represent a threat, nonetheless
they should be identified to make easier to spot and
interpret them. We can also see that there are various
professional categories of management responsibili-
ties, and they are not used regularly. So their accesses
appear classified as suspicious accesses due to their
pattern of very short usage, specially when comparing
with the expected duration for a shift. Even seeming
normal at a first glance, it would be recommendable
to track the behaviour of these accesses in particular,
once they provide confidencial data. We think that a
detailed analysis of the pattern of these accesses may
give further indication of their legitimacy.
By the point of view of the professional category
of the staff that access to HIS, the main categories
that access are administrative, nurses, physicians and
specialist physicians. In general, they present normal
activity in what concerns to activity longer than ex-
pected (≤780 minutes), 27 in 276 which represent
9,78% of the results. Physicians and Specialist physi-
cians are the categories that have more cases of this
type of activity, longer than expected. Some of these
suspicious accesses may be explained by the fact that
Obscare system is also used in emergency context,
and not only for consulting or hospital stay context.
In emergency context shifts may be longer than 12
hours, up to 24 hours (L.Correia et al., 2019). The
suspicious accesses detected are in most cases for ac-
tivities shorter than expected (≥300 minutes), 152 in
276 representing 55% of the results and it is common
to all categories. We supose that the consecutive time
of activity on HIS by professionals in general proba-
bly may be shorter than six hours.
In the case of consecutive days of work, exclud-
ing automatic processes which are 9 of 318 (2,83%),
only specialist physician category exceeds the ex-
pected number of consecutive days of activity, which
are 7 of 309(2,27%). The constraints of patient data
access to care delivery it is usually used the creden-
tials of physicians because most of the times they do
not have EHR access limitations. These occurrences
might explain the values obtained. In general, we see
that accesses that show the highest percentage of be-
ing suspicious are the ones associated to physicians
categories and are in line with our expectations. How-
ever a deeper analysis would be necessary to have fur-
ther conclusions about these results. Relatively to ac-
cesses made to read medical records, the mean of sus-
picious access is 79% of the total accesses, and when
analysing by category we can see that this high per-
centage is transversal to all categories. Even when
excluding the categories that normally access to get
reports, every type of management and research cat-
egories that access to extrat data and do not update
records, the percentage of suspicious access grows to
93%, which means that only 7% of the records are ac-
cessed and updated. For this UC we should evaluate
again the data that it is being analysed, test it during a
longer period of time and find out whether this num-
bers are correct, performing an analysis on the field.
5 CONCLUSIONS
The scope of this study is very complex and requires
a very thorough analysis. Although the difficulties we
found it was possible to create a proof of concept of a
system to detect suspicious accesses by professionals
from healthcare institutions.
Some limitations we have are the lack of detail
of the tasks performed by healthcare professionals to
create more precise rules for algorithms. An analy-
sis on the field, would be also very useful to better
understand the results and, probably, change the clas-
sification of some accesses. Another limitation is the
availability and quality of HIS logs. Obscare system
has already logs prepared for GDPR compliance, but
many systems have not and institutions need to make
a great effort on providers to have this information.
The period of test should be longer than nine days to
detect more patterns in the results obtained.
Nonetheless it was possible to model the scenar-
ios of undue access and create algorithms to detect
suspicious accesses. The results obtained gave a first
glance of what is happening at the level of HIS ac-
cess. A strength of using Obscare system was the fact
that it is used on hospital stay, consulting and emer-
gency context. It may explain some of the outliers
detected, as the emergency shifts may have different
Illegitimate HIS Access by Healthcare Professionals Detection System Applying an Audit Trail-based Model
545