医疗系统安全课程规划.ppt
《医疗系统安全课程规划.ppt》由会员分享,可在线阅读,更多相关《医疗系统安全课程规划.ppt(109页珍藏版)》请在三一办公上搜索。
1、醫療系統安全課程規劃,醫療系統安全課程第16週規劃,6/18總結專題報告?XX醫院/醫學中心醫療資訊安全系統設計資訊安全通訊期刊邀稿整合醫療資訊安全系統報告?HIE Security and Privacy through IHESecurity and Authorization Issues in HL7 Electronic Health Records:A Semantic Web Services Based Approach,第一組 萬芳醫院,第二組 振興醫院,第三組 馬階醫院,第四組 義守醫院,第五組 三軍總醫院,第六組 台大醫院,第七組 長庚醫院,第八組 台北榮總醫院,醫療系統
2、安全課程第16週規劃,6/18總結專題報告?XX醫院/醫學中心醫療資訊安全系統設計資訊安全通訊期刊邀稿整合醫療資訊安全系統報告?HIE Security and Privacy through IHESecurity and Authorization Issues in HL7 Electronic Health Records:A Semantic Web Services Based Approach,XX醫院/醫學中心醫療資訊安全系統設計,醫療資訊安全概論醫療資訊與隱私權重要何謂醫療資訊安全?醫療資訊安全與資訊安全差異?(從資安揭露角度)XX醫院/醫學中心醫療資訊安全系統目前醫療資訊系
3、統架構及資安缺口醫療資訊安全需求(機密 真確 權限 不可否認 等)未來具有資安功能的醫療資訊系統架構 UCA XKMS SAML XACML為確保隱私權應有的醫療資訊安全政策 HIPPA結論,醫療系統安全課程第16週規劃,6/18總結專題報告?XX醫院/醫學中心醫療資訊安全系統設計資訊安全通訊期刊邀稿整合醫療資訊安全系統報告?HIE Security and Privacy through IHESecurity and Authorization Issues in HL7 Electronic Health Records:A Semantic Web Services Based App
4、roach,資訊安全通訊期刊邀稿,資訊安全通訊雜誌係由中華民國資訊安全學會發行之刊物,並定期於每年一月、四月、七月及十月出版資訊安全相關領域之研究論著,每一期將邀請一位Guest Editor針對當期主題進行規劃與邀稿。此期刊並非TSSCI或EI,但為國內資訊安全重要期刊。後進(許建隆教授)目前受邀擔任資訊安全通訊期刊(Communications of CCISA)2008年10月10日出刊的特約主編,本次期刊主題為醫療資訊安全,涵蓋理論、實務、經驗、政策等相關議題,希冀藉由此期刊之內容,能讓讀者更多涉獵並重視醫療資訊安全。,醫療系統安全課程第16週規劃,6/18總結專題報告?XX醫院/醫學
5、中心醫療資訊安全系統設計資訊安全通訊期刊邀稿整合醫療資訊安全系統報告?HIE Security and Privacy through IHESecurity and Authorization Issues in HL7 Electronic Health Records:A Semantic Web Services Based Approach,HIE Security and Privacy through IHE,A Healthcare Information Exchange(HIE)is a set of healthcare entities that are coopera
6、ting to share healthcare information about common patients.The IHE has proposed that a basic method of providing a HIE is through an infrastructure that allows for the sharing of clinical documents about a patient in a way that allows for long term use.This infrastructure is made up of a family of P
7、rofiles centered on the Cross-Enterprise Document Sharing(XDS)Profile.This white paper will discuss how an HIE that leverages IHE profiles can protect patient privacy and information security.The organizers of the HIE need to implement basic security principals in order to offer a security model to
8、protect the HIE information exchanges.The architecture put forth by IHE is to share discrete information in the form of documents.These documents may be simple text documents,formatted documents using standards such as PDF,or fully structured and coded using standards such as HL7 CDA.These documents
9、 are shared with reference to the individual patient with the expectation that in the future they can be used to provide better healthcare treatment to that same individual patient.,HIE Security and Privacy through IHE,IntroductionScoping Security and PrivacyInternational Data Protection PrinciplesP
10、olicies and Risk Management Technical Security and Privacy controls Applying Security and Privacy to an HIEBuilding Upon Existing Security EnvironmentIHE Security and Privacy ToolkitIHE Security and Privacy Controls Conclusion,Elements of the health information exchange challenge,Open“governance”Tru
11、st relationships among participantsInvolve consumersProvide securityDevelop sustainable fundingProvide capable business services and operationsDevelop technical capabilities and operations,Scoping Security and Privacy,The Policy Environment is made up of many layers of policies.These policies work t
12、ogether in a hierarchic way to interlock.We will introduce some of these different layers in this white paper and show how they influence the technology.International Data Protection PrinciplesPolicies and Risk ManagementTechnical Security and Privacy controls,HIE Security and Privacy through IHE,In
13、troductionScoping Security and PrivacyInternational Data Protection PrinciplesPolicies and Risk Management Technical Security and Privacy controls Applying Security and Privacy to an HIEBuilding Upon Existing Security EnvironmentIHE Security and Privacy ToolkitIHE Security and Privacy Controls Concl
14、usion,International Data Protection Principles,In 1980,the Organization for Economic Cooperation and Development(“OECD”經濟合作暨發展組織)developed Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.These guidelines were intended to harmonize national privacy laws,uphold human rig
15、hts,and promote the free flow of information among its 30 member countries.The OECD guidelines have served as a basis for data protection laws in the United States,Europe,Canada,Japan,Australia,and elsewhere.Together,these principles and laws provide a useful framework for developing general data pr
16、otection requirements for health information systems.In the context of this paper,these data protection principles will be scoped to the IHE relevant policies and understood in the context of the IHE risk environment.The technical controls that are relevant to IHE are distilled below.,http:/www.oecd
17、.org/document/20/0,3343,en_2649_201185_15589524_1_1_1_1,00.html,HIE Security and Privacy through IHE,IntroductionScoping Security and PrivacyInternational Data Protection PrinciplesPolicies and Risk Management Technical Security and Privacy controls Applying Security and Privacy to an HIEBuilding Up
18、on Existing Security EnvironmentIHE Security and Privacy ToolkitIHE Security and Privacy Controls Conclusion,Policies and Risk Management(1/5),IHE solves Interoperability problems via the implementation of technology standards.It does not define Privacy or Security Policies,Risk Management,Healthcar
19、e Application Functionality,Operating System Functionality,Physical Controls,or even general Network Controls.While HIE Policies and Risk Management are outside its scope,IHE does recognize that these elements are a necessary piece of a system implementation.IHE IT Infrastructure Technical Framework
20、,Volume 1:Appendix“L”outlines some of the issues that should be evaluated to be included in the local Policy creation and Risk Management decisions.Also,the IHE IT Infrastructure Planning Committee has produced a white paper that guides IHE profile developers on detail risk identification so the pro
21、files can properly advise implementers.It is therefore the duty of system implementers to take this guidance into account as part of their Risk Management practices,Policies and Risk Management(2/5),Figure 2 shows how the corporate Polices are developed,promulgated,95 and eventually implemented with
22、 varying degrees of automation.Policy enforcement must be a part of this policy lifecycle.,Policies and Risk Management(3/5),For example implementers need to be aware of different kinds of policies that need to be harmonized with local enterprise policies:Policies for who has access to what type of
23、documents in the HIE(Access)Policies for who is allowed to publish documents into the HIE(Write)Policies on the acceptable types of documents in the HIEPolicies that indicate acceptable levels of risk within HIEPolicies that indicate what sanctions will be imposed on individuals that violate the HIE
24、 policiesPolicies on training and awarenessPolicies on user provisioning and de-provisioning within affinities(and local operations policy)Policies on emergency mode operationsPolicies on acceptable network use and protectionsPolicies on authentication methods that are acceptablePolicies on backup a
25、nd recovery planningPolicies on acceptable third party accessPolicies on secondary use of the information in the HIEPolicies on the availability of the HIE(is the HIE considered life critical,115 normal,or low priority)Policies for maintenancePolicies for length of time that information will be main
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 医疗 系统安全 课程 规划
![提示](https://www.31ppt.com/images/bang_tan.gif)
链接地址:https://www.31ppt.com/p-4978997.html