TOTAL: {[ getCartTotalCost() | currencyFilter ]} Update cart for total shopping_basket Checkout

The Privacy Advisor | Diagnosing the Risks of Online Healthcare Related reading: OCR issues rule for reproductive health care under HIPAA

rss_feed

""

Over the past few years, we’ve seen increased use of online platforms and mobile applications that allow us to engage directly with doctors and healthcare providers in a way consumers never have before, whether researching a medical condition, accessing test results or making an appointment with a doctor online. Unfortunately, as healthcare organizations rush to keep pace with the latest online technologies and services (eHealth), an array of vulnerabilities can be exposed, leaving consumers’ personal information susceptible to fraudulent activity if not addressed immediately.

While online and mobile health services technology advances offer numerous benefits, including the potential of improved care and easier and more efficient patient management, they also bring heightened concerns regarding privacy and security. Medical and healthcare records contain a plethora of sensitive and private information that can be used by hackers to steal a patient’s identity, abuse medical prescriptions or for sale on the black market for a going rate of $20 per record, a big jump compared to the $1 to $2 value of U.S. credit card numbers and CVV codes. Consumers are now taking notice of these threats and are understandably concerned for the security of their health records. Specifically, 56 percent report concerns about the theft of their health-related personal information or insurance credentials when using online services.

With healthcare data breaches on the rise—43 percent of breaches in 2013 were healthcare related—it's essential that privacy professionals within the industry understand the perceived risks of eHealth services and the security and privacy measures patients expect. Judging by the recent number of healthcare-related breaches, I don’t believe these concerns are going to be dismissed any time soon.

Already we’ve seen recent prominent healthcare breaches impact consumer and patient confidence in the industry. In fact, eHealth services are considered amongst Internet-savvy users as more risky than other online activities—including email and, surprisingly, making financial transactions. These concerns translate directly into a consumer’s hesitance to adopt new technologies, as 64 percent cited privacy issues for accessing patient records online a key eHealth concern. Equally concerning is an organization’s loss of customers’ trust and business after a security incident. As seen from some of this year’s high-profile data breaches, there are very real financial and reputational consequences a security incident can have on companies in every sector.

The question is, how can healthcare providers and organizations overcome the increase in security and privacy concerns to put consumers at ease? From my experience, I believe there are three risk categories every privacy and security professional should focus on to address eHealth concerns and maintain consumer trust including:

  • Third-Party Vulnerabilities

It can be difficult for healthcare organizations and their staffs to protect themselves against breach and privacy violations as they collect and store a large amount of sensitive data. Add privacy and security concerns with increasingly complex data flows often going to manage third-party vendors, and privacy professionals face another layer of complexity in their protective planning. While the use of third-party vendors can provide organizations significant cost savings, the rise of external support for these healthcare organizations and their technology implementations creates a larger exposure window to potential security and privacy threats. To that end, a recent report from the Ponemon Institute found two-thirds of healthcare breaches during the past 24 months were sourced from a third party or business associate.

To address this issue, prior to establishing a relationship with a third-party vendor, be sure to audit your security and privacy practices to determine if the organization is up-to-snuff. Providers should also conduct the audits on a semi-annual basis with all third-party vendors that have access to patient data. These audit protocols, and vendor adherence, will remain important as more healthcare organizations contract with third-party vendors to provide platforms for eHealth services, like mobile phone and web applications. It’s worth highlighting that 69 percent of patients note the importance of adequate security safeguards for online health services, according to a recent Ponemon Institute study.

  • Employee Errors

Surprisingly, 93 percent of breaches exposing protected health information are caused by human error, with only seven percent caused by external IT incidents or hacking. Employees are on the frontline for protecting patient data and should be outfitted with the skills and knowledge they need to implement best practices. Similar to the audit function discussed above, healthcare organizations should conduct regular trainings to review security and privacy procedures with employees and provide annual updates on industry regulations. In addition, providers should evaluate professional training programs for employees who handle patient data, for example, having employees trained through the IAPP’s privacy certification programs.

  • Insufficient Data Breach Response Plans

Unfortunately, today’s online ecosystem means the likelihood of a data breach is now higher than ever before. Like any crisis plan, companies can avoid customer churn after a breach by preparing a response plan in advance. It’s important organizations have a formal data breach response plan in place to address an incident as it arises. This step is essential for the healthcare industry; organizations that experience a data breach are also at risk of violating hard-hitting consumer protection laws, including the Health Insurance Portability and Accountability Act (HIPAA), the HIPAA Omnibus Rule and the Health Information Technology for Economic and Clinical Health Act.

The biggest surprise, however, may be that last year, 39 percent of companies indicated they still had not developed a formal data breach plan even after experiencing a breach, according to the Ponemon Institute. In my experience, those same companies are not only spending more money to respond to data breaches, but they’re also losing customers, which in return will affect revenue. The Ponemon Institute found more than 83 percent of patients indicated they would discontinue their relationship with a mobile health application or online health resource if that service experienced a data breach. By proactively creating an incident plan, conducting live exercises to implement response measures and updating the content and strategy as necessary, organizations can better manage data breach incidents and hope to maintain or regain patient and customer trust. In addition, proactive measures may help reduce the cost of a security incident, which EMC found to cost providers more than $1.6 billion a year.

Nowhere else in the information-security world does the cumulative impact of cyber-crime reach levels as potentially disastrous as in the healthcare field—especially with the increased use of eHealth services. While these technologies are valuable, consumer concern for the threat of identity theft is at an all-time high, meaning healthcare organizations need to up their game to maintain consumer confidence and put privacy concerns at ease. By addressing and communicating third-party vulnerabilities, employing frequent internal education processes and having a data breach response plan in place, organizations can begin to diagnose and overcome the barriers to adopting and embracing eHealth services.

Comments

If you want to comment on this post, you need to login.