Hands off my Health Info!
Security Threats
&
Solutions
Confidentiality
&
Healthcare
Health Information Security and Mobile Computing
What's in a Threat?!
100
An individual’s right to prevent the disclosure of personal information and to determine the amount, the availability and the accessibility of any disclosed information
What is privacy?
100
Infected email or IM attachments
What is Malware?
100
A customized entry requirement that may ask for specific lengths, characters and sequences
What are passwords?
100
A repetitive process that responds to technological improvements and changes in the health care setting
What is health information security?
100
A person who penetrates systems and does not view the act as criminal
What is a hacker?
200
Requires actions, like obtaining informed consent from a patient, to share collected information with others and it safeguards against the disclosure of identifying markers
What is information privacy?
200
The criminally fraudulent process of attempting to acquire sensitive information, such as usernames, passwords, and credit card details
What is Phishing?
200
I have your picture, name and may even assign you a title
What is an identification badge (ID)?
200
The increasing use of mobile devices in health care multiplies this risk to hospitals
What is a security breach?
200
A disruption to normal system operation and the unecessary destruction of computer equipment or data
What is sabatoge?
300
Ranks as the second most regulated industry, yet it leads all industries in data breaches
What is healthcare?
300
The ability to steal personal information, such as social security numbers stored on computers
What is Cybercrime?
300
Going in the regular trash receptacle exposes me in ways I don’t like
What is confidential patient documents/information?
300
Lack of proper this allows unlawful users to access hospital networks and look at private data that is conveyed over the network
What is Wi-Fi security?
300
Use of pop-ups designed to look like messages, warning of a problem or virus infection, and it may get you to download a program to "fix" the problem
What is scareware?
400
A nurse violates this when discussing, or divulging any patient health information (PHI) to any individual other than identified persons by the patient, or members of the healthcare team directly involved in the patient plan of care
What is patient confidentiality?
400
A set of computer programs that can locate and eradicate malware, including computer viruses, worms, and Trojan horses
What is antivirus software?
400
Monitors and protects by restricting unauthorized information from entering a facility’s computer system
What is a Firewall?
400
Causes mandatory notice of a breach of patients’ health information and subsequent reporting to the Department of Health and Human Services and media under the American Recovery and Reinvestment Act
What is the theft or loss of a mobile device?
400
Defined as, "the capability of a system as a whole to fulfill its mission, in a timely manner, in the prescence of attacks, failures, or accidents."
What is survivability?
500
Policies are in place to limit the use of personal devices in the workplace, but a new trend is developing in healthcare to allow nurses to use their own mobile devices in the workplace
What is Bring Your Own Device (BYOD)?
500
In the near future it is expected to replace passwords, it uses unique biological traits, such as fingerprints, voice or face recognition and cannot be forgotten or stolen
What is Biometrics?
500
Promotes the adoption and meaningful use of health information technology
What is The Health Information Technology for Economic and Clinical Health Act or (HITECH)?
500
Even with the use of protective technology such as encryption, they represent vulnerabilities and a rise in residual risk
What are human factors?
500
An inside threat source who disrupts information availability, corrupts data integrity and views information inappropriately
What is an unauthorized user?
M
e
n
u