Affiliation:
1. Kennesaw State University, USA
Abstract
Electronic health record (EHR) applications are digital versions of paper-based patients health information. EHR applications are increasingly being adopted in many countries. They have resulted in improved quality in healthcare, convenient access to histories of patient medication and clinic visits, easier follow up of patient treatment plans, and precise medical decision-making process by doctors. EHR applications are guided by measures of the Health Insurance Portability and Accountability Act (HIPAA) to ensure confidentiality, integrity, and availability. However, there have been reported breaches of protected health identifier (PHI) data stored by EHR applications. In many reported breaches, improper use of EHRs has resulted in disclosure of patient's protected health information. The goal of this chapter is to (1) provide an overview of HIPAA security and privacy requirements; (2) summarize recent literature works related to complying with HIPAA security and privacy requirements; (3) map some of the existing vulnerabilities with HIPAA security rules.
Reference29 articles.
1. Arndt, R. Z. (2017). Emory Healthcare cyberattack affects 80,000 patient records. Retrieved from http://www.modernhealthcare.com/article/20170302/NEWS/170309983/emory-healthcare-cyberattack-affects-80000-patient-records
2. One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques
3. The Health Insurance Portability and Accountability Act: Is it really all that bad?;D.Bowers;Proceedings - Baylor University. Medical Center,2001
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The danger of missing instructions;Proceedings of the 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies;2018-09-26