patient privacy in telehealth - isfteh · pdf filesecure connections (internet/email),...

8
Patient Privacy in Telehealth

Upload: vuongdien

Post on 07-Feb-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

Patient Privacy in Telehealth

Disclaimers• The views expressed here are those of the speaker, and not those of any partners, client, or clinicians at TeleNurse Network, LLC.

• The information presented is intended to be helpful, and educational, but is no substitute for legal advice.

• No claim of copyright in clip art.

https://twitter.com/TeleNurse_Net

Brief Bio

Marisela Cigliuti, BSN, RNCEO of TeleNurse Network

[email protected]

https://www.facebook.com/TeleNurseLLC/

Patient Privacy Secure connections (internet/email),

encryption in website/software, video, & providing data to a patient’s authorized providers only (consents).

Remote patient monitoringCognitive impairment: guardianship;

advance directives Include discussions of aging services

technologies: what wearables, monitors are acceptable for the patient.

4

Skype and Health Privacy AES 256-bit encryption Free (except for Business Solution) Access to patient’s environment BUT: Skype makes no claim that its services can

be used in a HIPAA-compliant fashion Skype does not offer a BA Agreement Cannot verify transmission security No audit trails No breach notifications No offer of technical support Frequently dropped calls

5

Privacy with Apps, Phones, Tech Text messages

Wireless phone carriers-not CEs; indefinite life Passwords often lacking

Apps: transmit unencrypted info to advertising and data analysis sites without user's knowledge Privacy protections reduced when inputting info into

apps: puts that info out into the public Consumer protection laws: not limited as HIPAA is to

specific entities or specific types of information Cover both general and health info

communications

6

Privacy Risk Management Continuing education on data security Periodic password changes Data security certifications for appropriate staff Counsel to review system security procedures and

documentation Demand data systems that meet security thresholds

Firewalls

Security certificates authentication

Device-level authentication

Strong passwords

7

Questions?Contact info: Email – [email protected] ID: MCigliuti1www.TeleNurse.Co