an auditable event should record an Audit Log. This
will likely result in multiple Audit Log entries that
show whether privacy and security safeguards, such
as access control, are properly functioning across an
enterprise’s system-of-systems (Kong, 2012). Thus,
it is typical to get an auditable event recorded by
both the application in a workflow process and the
servers that support them. For this reason, duplicate
entries are expected, which is helpful because it may
aid in the detection of. For example, fewer than ex-
pected actors being recorded in a multi-actor process
or attributes related to those records being in conflict,
which is an indication of a security problem (Mar-
gulies, 2015).
The content of an Audit Log is intended for use
by security system administrators, security and pri-
vacy information managers, and records management
personnel. This content is not intended to be acces-
sible or used directly by other healthcare users, such
as providers or patients, although reports generated
from the raw data would be useful. An example is a
patient-centric accounting of disclosures or an access
report. Servers that provide support for Audit Log re-
sources would not generally accept update or delete
operations on the resources, as this would compro-
mise the integrity of the audit record. Access to the
Audit Log would typically be limited to security, pri-
vacy, or other system administration purposes (Jaya-
balan, 2017), (Kent and Souppaya, 2006).
Portugal has an extensive information infrastruc-
ture, which plays a central role in supporting health-
care provision, but not all data sources are effectively
connected and some challenges in patient privacy and
the legal basis for connecting patient data remain
(Sim
˜
oes, 2017). Health Information Systems de-
ployed in Hospitals or primary care units were mainly
devoted to support local performed operational tasks
and were implemented without an integrated perspec-
tive, leading with a great heterogeneity and data du-
plication (Pinto, 2016).
Ineffective data management, compliance issues,
and cyber security risks are often linked with not hav-
ing systematic approaches to investments in people,
processes, and technology. Dated technology is ev-
erywhere and connected to everything— not just on
desktop PCs. Many employees at hospitals, health
plans, life sciences companies, and governments lack
awareness of and training to manage financial, oper-
ational, compliance, and cybersecurity risks (Cooper,
2018).
These constitutes a major problem when health
care institutions have to manage a vast amount of ap-
plication, as observed in many public hospitals in Por-
tugal.
Since the date of effect, GDPR takes at least
ninety-one GDPR violations identified by data protec-
tion authorities around Europe, as published by CMS
(CMS, 2019). Since not all fines are made public, this
number cannot be complete. Inside healthcare sec-
tor at least two violations are reported, the fines and
penalties are around 400.000 euros. The first iden-
tified GDPR violation in the healthcare sector hap-
pened in Portugal and was reported by the Portuguese
Data Protection Authority. The investigation in Cen-
tro Hospitalar Barreiro Montijo revealed that the hos-
pital’s staff, psychologists, dietitians and other profes-
sionals had access to patient data through false pro-
files. Portuguese Data Protection Authority identified
that the identity management system appeared defi-
cient – since the hospital had 985 registered doctor
profiles while only having 296 doctors. Moreover,
doctors had unrestricted access to all patient files, re-
gardless of the medical doctor’s specialty. These is-
sues events revealed violation of Article 5 (1) f) and
Article 32 (CNPD, 2018) (Monteiro, 2019). The sec-
ond case was reported by Dutch Supervisory Author-
ity for Data Protection in Haga Hospital. It was de-
tected a violation of Art. 32 GDPR (European Comis-
sion;, 2016), because this Hospital does not imple-
ment a proper internal security of patient records in
place. The investigation followed by Dutch Super-
visory Authority for Data Protection concludes that
dozens of hospital staff had unnecessarily checked the
medical records of a well-known Dutch person (Per-
soonsgegevens, 2019).
The aim of this work is to understand the maturity
level of a Portuguese Healthcare Organization in their
audit records to comply with GDPR article 30 and 32
since healthcare organizations operate in a daily-basis
with sensitive personal data. To achieve this goal it
was selected a Portuguese Healthcare Organization
and with the hospital Information Technology (IT) de-
partment collaboration it was compiled the character-
istics of their information systems with a particularly
focus in the audit-log records of the activities.
2 METHODS
In this section will be presented the methodology used
to performed this study. In particular it will be pre-
sented the study design, the setting and participants.
2.1 Participants
This study was performed with the partnership of a
public Portuguese healthcare organization (Unidade
Sa
´
ude Local) constituted by a Hospital and 18 (eigh-
HEALTHINF 2020 - 13th International Conference on Health Informatics
556