Find us on
Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
Keynote: Securing IT in Healthcare: Part III
ISTS Information Pamphlet
|Thread 1 Team Members|
Effective use of healthcare IT requires that the right parties (such as clinicians, patients, and insurance adjusters) be able to access the information and computational resources they need, in a timely manner. However, because the information involved is sensitive and personal, healthcare enterprises need to manage this access carefully. Permitting inappropriate disclosure or modification of this data is socially irresponsible and possibly life threatening to patients – and also exposes the enterprises to legal, regulatory and economic repercussions. Besides the obvious internal risk of users having too much access (and abusing it) or too little (threatening patient care), we see many broader system-level risks: users may find the official IT system so unusable as to move their access and processing outside it (creating security, management, and reliability nightmares), or engage in behavior that defaults to all personnel having maximal access (also creating such nightmares).
The Thread 1 team has collaborated with clinical liaisons and a number of industry partners to advance their research. Several publications are available through the TISH publications database (see the TISH homepage) and below:
Last Updated: 1/15/14