Privacy and security in teleradiology

https://doi.org/10.1016/j.ejrad.2009.10.018Get rights and content

Abstract

Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

Introduction

The concept of security has many dimensions from physical security to information security [1]. Core elements of the information security are confidentiality, integrity, availability, accountability and non-repudiation of information. In this paper we focus on information security in teleradiology. Other security dimensions are not discussed.

Privacy is a fundamental human right and basic privacy protection principles are universal [2], [3], [4]. Information privacy concerns exist wherever personally identifiable information is collected, processed, stored and disclosed. Information processing itself covers the whole lifecycle of personal data from creation to destruction.

In this paper we first discuss on security and privacy protection principles and requirements already developed for electronic health records and EHR-systems. The remainder sections of this paper are focused to security and privacy protection requirements, controls, safeguards and security services needed to make modern teleradiology trusted in such a way that confidentiality, integrity and availability of information as well as accountability, and in many cases also non-repudiation of information are proven when information is created, updated, modified, moved or transferred, stored, deleted, archived and destructed.

Basic information privacy principles are [2], [7], [8], [9]:

  • -

    personal data shall be processed fairly and lawfully;

  • -

    personal data shall be held only for specified and lawful purposes and shall not be further processed in any manner incompatible with that purpose or purposes;

  • -

    appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss, errors, abuse and misuse destruction of the data;

  • -

    accountability of processing personal data should be proven;

  • -

    the consent needed for data processing should be freely given;

  • -

    personal data shall not be transferred to any country or territory that does not ensure adequate level of protection;

  • -

    personal data shall be adequate, relevant and not excessive in relation to the purpose for which it is processed; and

  • -

    personal data processed for any purpose shall not be kept for longer than is necessary for that purpose.

In all countries privacy protection legislation defines the rights and duties of organisations and people with respect to the processing of personal data. Therefore data processing should be legal and meet regulatory and contractual obligations.

The content of patient's health data (e.g. the EHR, radiological referral or report) is sensitive, and in health care domain the data is in most cases also identifiable. Therefore health data should be protected in such a way that both the basic security and privacy protection principles discussed above and more detailed existing health care specific requirements are fulfilled.

The starting point for any eHealth service or application should be the definition of security and privacy protection policies. In practice adequate security and privacy protection is then achieved by implementation of reasonable controls and safeguards which can be defined via risk analysis. In any case it is mandatory that rules, controls and safeguards fulfil national regulatory requirements.

There exist many widely used guidelines and standards for security and privacy protection of personal health information [3], [5], [6]. The basic international standard developed for security management of health information is the ISO 27799 (Security Management in Health Using ISO/IEC 17799). In many countries national health authorities have developed additional good practice guidelines for secure management, use and disclose of health records [3], [6].

Section snippets

Security and privacy protection models used in teleradiology

Teleradiology has been for a long time understood to be an eHealth service done through remote transmission of images over electronic networks and with an interpretation of the transmitted images for diagnostic purpose. In this paper we develop security requirements for two widely used models in today's teleradiology. Security management of both models are based on predefined security principles and rules between the partners. The third model discussed in Section 6 is the future pervasive

Security and privacy protection plan, controls and safeguards

In teleradiology security domains can share same legislation and rules, or legislations and rules can be different. From security and privacy protection point of view the basic question is how the data controller can trust on the data processor's information system, and is the communication security proven? We need both organisational measures and technical solutions to build a trusted teleradiology service system.

Basic organisational level security requirements relevant in teleradiology are:

  • -

Security of the on-line teleradiology

In on-line teleradiology model the consultant uses remotely service provider's computer services (e.g. PACS/RIS system) to offer consultation. In this case the consultant is acting as an external user of data controller's legacy system. This kind of external temporary use of legacy system's resources requires special attention because authorisation and access control services developed for present legacy systems in most of cases are not planned to manage in trusted way visiting external user

Security in cross-border teleradiology

Cross-border teleradiology can happen both inside the same jurisdiction (e.g. inside EU) or between jurisdictional borders. Transfer of personal data between EU Member States is controlled by the EU Data Protection Directive which forms a uniform legal data protection environment [2]. In all cases requirements set by the national legislation have also to be fulfilled [7].

In cross-jurisdictional situations it is necessary that all responsibilities between domains and partners are exactly

Discussion

Teleradiology is nothing more than one of eHealth services where data sharing is taking place over cross-organisational boundaries. From other side teleradiology has been the first line demonstrator for successful cross-organisational and cross-border eHealth services. Therefore the adaptation of security and privacy protection principles already used in teleradiology helps the development of new cross-organisational eHealth services.

The road-map to trusted teleradiology starts from

References (14)

  • ISO/IEC 17799:2005, Information technology – Code of practice for information security...
  • EU Directive...
  • HIPAA documentation,...
  • Confidentiality, NHS Code of Practice, November...
  • ISO 27799, Health Informatics — Security Management in Health Using ISO/IEC...
  • Records Management, NHS Code of Practice, Part 1 and Part 2, Department of Health, London...
  • Ruotsalainen P, Attachment 8, Interreg PACS. Final Report, University of Helsinki...
There are more references available in the full text version of this article.

Cited by (0)

View full text