Skip to main content
Top
Published in: Journal of Medical Systems 4/2016

01-04-2016 | Systems-Level Quality Improvement

Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle

Authors: Stephen J. Tipton, Sara Forkey, Young B. Choi

Published in: Journal of Medical Systems | Issue 4/2016

Login to get access

Abstract

This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual’s Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today’s technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.
Literature
2.
go back to reference Choi, Y. B., Capitan, K. E., Krause, J. S., and Streeper, M. M., Challenges associated with privacy in health care industry: Implementation of HIPAA Security Rules. J. Med. Syst. (JMS) 30(3):57–64, 2006.CrossRef Choi, Y. B., Capitan, K. E., Krause, J. S., and Streeper, M. M., Challenges associated with privacy in health care industry: Implementation of HIPAA Security Rules. J. Med. Syst. (JMS) 30(3):57–64, 2006.CrossRef
5.
go back to reference Flight, M., Law, liability, and ethics for medical office professionals, 5th edition. Delmar, Cengage Learning, Clifton Park, NY, 2011. Flight, M., Law, liability, and ethics for medical office professionals, 5th edition. Delmar, Cengage Learning, Clifton Park, NY, 2011.
6.
go back to reference Grantham, D., Confidentiality alternatives for exchanging electronic medical records take shape. Behav. Healthc. 33(3):37–39, 2013.PubMed Grantham, D., Confidentiality alternatives for exchanging electronic medical records take shape. Behav. Healthc. 33(3):37–39, 2013.PubMed
11.
go back to reference Health records privacy. Va. Code Ann. § 32.1-127.1:03. Health records privacy. Va. Code Ann. § 32.1-127.1:03.
14.
go back to reference Medical records; ownership; provision of copies. Va. Code Ann. § 54.1-2403.3. Medical records; ownership; provision of copies. Va. Code Ann. § 54.1-2403.3.
15.
go back to reference Mir, S. S., HIPAA Privacy rule: Maintaining the confidentiality of medical records, Part 2. J. Health Care Compliance 13(3):35–78, 2011. Mir, S. S., HIPAA Privacy rule: Maintaining the confidentiality of medical records, Part 2. J. Health Care Compliance 13(3):35–78, 2011.
19.
go back to reference Ryoo, J., Choi, Y. B., & Oh, T., Security and privacy in mobile telemedicine. In Xiao Y. & Chen H. (Eds.), Mobile Telemedicine: A Computing and Networking Perspective (pp. 175–193). World Scientific Publishing Co., 2008. Ryoo, J., Choi, Y. B., & Oh, T., Security and privacy in mobile telemedicine. In Xiao Y. & Chen H. (Eds.), Mobile Telemedicine: A Computing and Networking Perspective (pp. 175–193). World Scientific Publishing Co., 2008.
21.
go back to reference Tipton, S. J., White II, D. J., Sershon, C., and Choi, Y. B., iOS Security and privacy: Authentication methods, permissions, and potential pitfalls with touch ID. Int. J. Comput. Inf. Technol. 3(3), 2014. Tipton, S. J., White II, D. J., Sershon, C., and Choi, Y. B., iOS Security and privacy: Authentication methods, permissions, and potential pitfalls with touch ID. Int. J. Comput. Inf. Technol. 3(3), 2014.
23.
go back to reference Whitman, M., Mattord, H., and Green, A., Principles of Incident Response & Disaster Recovery. Course Technology, Boston, MA, 2014. Whitman, M., Mattord, H., and Green, A., Principles of Incident Response & Disaster Recovery. Course Technology, Boston, MA, 2014.
Metadata
Title
Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle
Authors
Stephen J. Tipton
Sara Forkey
Young B. Choi
Publication date
01-04-2016
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 4/2016
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-016-0465-x

Other articles of this Issue 4/2016

Journal of Medical Systems 4/2016 Go to the issue