Record Level Data Security; storage plus fixed and mobile transmission

2003-05-02 Thread lakew...@copper.net
Security begins at the data storage level. Unless it can be protected at
this level more sophisticated techniques applied to transmission and content
will not be as effective as desired.

Three common approaches are:
1)Data security
2)Data management and
3)Access to storage media-resident data, e.g., somebody's disk drive

These can occur long before access security is needed in a Healthcare
environment, but are also appropriate for data storage and access within a
Healthcare environment.

DATA SECURITY
Good example is the CDSA project gratis from Intel:

http://www.intel.com/labs/archive/cdsa.htm
http://www.opengroup.org/security/l2-cdsa.htm

which relieves upon:
1)digital certificates and
2)portable digital tokens

Neat stuff since already the Healthcare Computer System Administrator has
capable security tools. The Secure Data Store Admin should have these
available as well. Target systems include Windows and Linux and security
adaptability is supported.

Fixed data transmission environment have multiple techniques for securing
data during transmission, e.g., SSL, HTTPS and these work well between fixed
Healthcare environments, e.g., Hospital-Clinic.

Mobile applications are crucial. Mobile Healthcare applications are not
exempt from data security requirements. Data transmission security
mechanisms for fixed environments do not work well in mobile environments
and hence new techniques have been developed.

The following link covers Java in a mobile environment:

http://www.javaworld.com/javaworld/jw-12-2002/jw-1220-wireless.html

Presuming that the data is now available at a Healthcare environment the
following may apply:
1)data storage, management, handling and transmission can be similar to that
described previously
2)Healthcare-specific systems (e.g., GNUmed:
http://www.gnumed.org/development/home.html  and OpenEHR) can be interfaced
to the data obtained from external sources
3)Bi-directional record translations are possible (may be required)
4)Data security and privacy issues remain

COMMENTS
1)A single Healthcare facility complete with a familiar set of EHR/EPR
software, process, procedures, techniques and trained personnel  may
represent a single intelligent node existing in a 'fabric' containing
Patients, related services, non-conforming practitioners and other similarly
intelligent node.
2)The intelligent nodes are not likely to be exact copies.
3)The processes, procedures, technologies, etc that have been used to
interface perhaps dissimilar intelligent nodes in other environments apply
4)Content is important to a Practitioner where it is "relevant"/"germane"
5)The goal is to provide the Practitioner with "relevant"/"germane"
information and nothing else

SUGGESTIONS
1)Develop a secure data storage, management, handling, transmission system
that delivers secured data to a systems available to a Practitioner
2)Develop applications that perform similar activities within a Healthcare
environment
3)Develop security applications that will access. manage, handle and filter
the data for the practitioner. exercising control over disposition, e.g.,
spawning copies/partial copies/forwarding/audits/time-limit functions,
communicating with external users, etc.
4)Add new facility-unique security that will precisely identify content,
e.g., digital watermarks.
5)Handle redundant data and secure data destruction.
6)Security plug-ins for practitioner- and facility-specific data security

Lots of stuff available!

-Thomas Clark



-
If you have any questions about using this list,
please send a message to d.lloyd at openehr.org



Record Level Data Security; storage plus fixed and mobile transmission

2003-05-03 Thread Gerard Freriks
On 2003-05-02 22:43, "lakewood at copper.net"  wrote:

> Security begins at the data storage level. Unless it can be protected at
> this level more sophisticated techniques applied to transmission and content
> will not be as effective as desired.
> 
> Three common approaches are:
> 1)Data security
> 2)Data management and
> 3)Access to storage media-resident data, e.g., somebody's disk drive
> 
>>>

You leave out completely the legal, social control and organisational
aspects.
Technology isn't a silver bullet.

Gerard

--   --
Gerard Freriks, arts
Huigsloterdijk 378
2158 LR Buitenkaag
The Netherlands

+31 252 544896
+31 654 792800


-
If you have any questions about using this list,
please send a message to d.lloyd at openehr.org