Security and Privacy of Data in Healthcare - PDF
Document Details
Uploaded by ExceedingXenon
Mercer University
Tags
Related
- Provider Analytics PDF
- Data Privacy and Confidentiality MEP2425-4 PDF
- AI Healthcare and Bioethics: Patient Privacy and Data Security Presentation PDF
- AI Healthcare and Bioethics: Patient Privacy and Data Security PDF
- AI Healthcare and Bioethics: Patient Privacy and Data Security PDF
- Health and Technology PDF
Summary
This presentation discusses various aspects of security and privacy of data in healthcare, focusing on the role of analytics, risk management, and compliance. It highlights the importance of data visualizations in grasping and communicating healthcare data. Historical examples such as John Snow's cholera map and Florence Nightingale's charts are also used to demonstrate the impact of data visualization in decision-making.
Full Transcript
Security and privacy of data Securing Analytics Information risk management has been in place across payers, providers, and life sciences companies to varying degrees for years. Common tools used to control the movement and use of sensitive information include perimeter security, encryption, and dat...
Security and privacy of data Securing Analytics Information risk management has been in place across payers, providers, and life sciences companies to varying degrees for years. Common tools used to control the movement and use of sensitive information include perimeter security, encryption, and data leak protection. Basic security infrastructures are designed to scale to handle larger databases and transaction volumes. 2 Analytics and Technological Veracity Adding analytical processes should not compromise the technological veracity of the common security infrastructure. Leading organizations are reconsidering the current concepts of permission and privacy within each sector. Anonymizing input data sets will not satisfy the ever-changing customer privacy and government regulations. 3 Reconsidering Permission and Privacy The role of analytics is to generate new insights from existing public and private data sets. The age-old practice of simply anonymizing input data sets will not satisfy the ever-changing customer privacy and government regulations. The idea of permission has to be completely rethought now to use the results of the analysis. 4 Legal and Compliance Concerns Hospital leadership is most concerned about the legal and compliance side of securing analytics. Information security has been a major investment for years, but permission must be completely rethought to use the results of analysis. The changing regulations and customer privacy requirements make it necessary to reconsider the current concepts of permission and privacy. 5 Risk Analytics in Healthcare Information Security Basic security measures (internal awareness, desktop security, network perimeter protections, data leak prevention, authentication, and database security) Aggregating basic security measures into a security posture score Competitive differentiator and marketing information safety results 6 Analytics and Technological Veracity Patients and information security CEOs and board-level advisors and information risk Internal and external benefits of risk analytics Return on investment in risk analytics 7 Predictive Analytics Isolated instances of applying predictive analytics to anticipate data breaches and loss Historical event patterns and predicting when incidents may occur Predicting incidents with service provider partners 8 Correlation Between Physical and Digital Events Focus of SIM vendors for years Advanced analytics to correlate physical and digital events Intersection between physical and digital security groups Real-time incident response decisions 9 Risk Dashboards Maturing from the standard green-yellowred approach Sophisticated pictures of the overall risk posture of an enterprise Financial impact information to prioritize responses to significant information breaches Proactive investments 10 Calculating the Monetary Value of Information Security Breaches Difficulty in estimating the value of information assets Marrying financial data with breach information for intelligent realtime decisions Big domain of analytics 11 Compliance and Acceptable Use in Healthcare Information Security HIPAA compliance, Red Flag rules, and HITECH Act are the key regulatory compliances in healthcare information security Perception of regulatory liability drives much of the spending in information security systems Leading organizations are seeing a payback to investment in risk analytics in the form of faster and more efficient reporting at lower cost 12 Regulatory Compliance HIPAA compliance garners the majority of attention among healthcare providers Actual regulatory penalties suffered due to noncompliance are uncommon Renewed focus on data security has emerged due to its role in meaningful use reimbursement 13 Role of Analytics in Regulatory Compliance and Acceptable Use Analytics may not change the perception of regulatory liability, but can lead to faster and more efficient reporting at a lower cost Vague requirements to conduct or review security and implement security updates to qualify for meaningful use reimbursement should generate a short-term bump in security spending to meet reimbursement requirements 14 Introduction Healthcare data visualizations has historical importance Importance of visual display is in grasping and communicating messages buried in data Pioneers in healthcare statistics and caregivers understood the power of visual display Examples : John Snow and Florence Nightingale 15 John Snow's Cholera Outbreak Map Mapping of London street addresses of residents who contracted cholera Relationship between pathogen-tainted water source and homes of those who fell ill Most cases were near the Broad Street pump Town council's removal of pump's handle led to outbreak abatement Reference: Visualizing Health and Healthcare Data 16 Florence Nightingale's Chart Compilation of statistics on causes of death during the Crimean War High mortality rates due to preventable diseases from unsanitary conditions in hospitals Fear that numbers lying flat on a page would be tedious and incomprehensible Presentation of information in charts, including the “Diagram of the Causes of Mortality in the Army in the East Reference: Visualizing Health and Healthcare Data 17 Dartmouth Atlas Project Recent efforts by healthcare researchers to document variations in medical resources apportioned and delivered in the US Build on Medicare data to provide comprehensive information and analysis Geospatial displays of data lead to profound insights and improvements Reference: Visualizing Health and Healthcare Data 18 Geospatial Display of End-of-Life Cancer Care Map from the Dartmouth Atlas Report: “Quality of End-of-Life Cancer Care for Medicare Beneficiaries” Percent of cancer patients admitted to intensive care during last month of life compared by hospital referral regions 24% of cancer patients nationwide were admitted to intensive care at least once during that last month Percent admitted varied more than sevenfold across regions Importance of asking why and what the rate should be Reference: Visualizing Health and Healthcare Data 19 Conclusion Power of data visualizations to help us see and consider stories buried in health and healthcare data Profound insights and changes/improvements in health and healthcare throughout history Revolutionary insights and improvements with technology and amassing data 20