Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/27/2011
06:04 PM
50%
50%

California Tightens EHR Security

New law requires that everyone leave breadcrumbs when using an electronic health record; related law expands telemed services.

Slideshow: Wireless Telehealth Brings Medical Help To Those In Need
Slideshow: Wireless Telehealth Brings Medical Help To Those In Need
(click for larger image and for full slideshow)
California governor Jerry Brown recently signed two bills that define how electronic health records (EHRs) and telehealth technology will be used by healthcare delivery organizations. Beginning January 1, 2012, hospitals, physician practices, and other healthcare stakeholders that manage patient information will be required to track and log any changes that are made to information stored in EHRs, as well as protect the confidentiality of medical information contained in EHRs.

Passage of SB 850, the Confidentiality of Medical Information Act, establishes rules for securely managing changes to patient information contained in EHRs. It comes amid a number of well-publicized breaches of computerized patient information.

The law requires that every healthcare provider, healthcare service plan, pharmaceutical company, and contractor who creates, maintains, preserves, stores, abandons, destroys, or disposes of medical records do so in a manner that preserves the confidentiality of the information contained in the record. The law also says that "negligence in conducting these activities may result in damages or an administrative fine or civil penalty, as specified."

"SB 850 gives California state regulators more power to ensure quality healthcare is available throughout the state in a private and secure manner," Dave Roberts, VP of government relations for the Healthcare Information and Management Systems Society (HIMSS), told InformationWeek Healthcare.

[Legally, EHRs are double-edged swords: They protect clinicians from malpractice litigation but also put them at greater risk. See Electronic Records May Increase Malpractice Lawsuit Risk.]

In a document that examines how the bill will impact providers, HIMSS focused on that part of the legislation that requires an EHR system to "automatically record and preserve any change or deletion of electronically stored medical information, and would require the record to include, among other things, the identity of the person who accessed and changed the medical information and the change that was made to the medical information."

According to HIMSS, SB 850 could have an impact on costs to providers when requests are made for EHR records, but the law is similar to existing federal laws. Providers should be mindful that:

-- Upon request, lawyers may be able to access these change/deletion logs, even though patients will not receive them. Additional discovery request costs may be incurred to the provider in these instances.

-- Changes and deletions to patient records shall include the identity of the person who accessed and changed the medical information; the date and time the medical information was accessed; and the change, if any, that was made to the medical information.

"We note that the format of these logs could vary between vendors and therefore [are] not standardized for readability or content; this law might serve as an entry point for the state to move in that direction, further complicating the 50 states, 50 rules scenario which is also a factor in the pharmaceutical labeling and packaging domains," HIMSS said in its statement.

This month, Gov. Brown also signed AB 415, the Telehealth Advancement Act of 2011. It broadens the range of practitioners who can practice telehealth to include all licensed healthcare professionals. The bill also removes restrictions on reimbursement of services provided via email or telephone, expands the number of telehealth care settings, and makes it easier for California hospitals to establish medical credentials for telehealth providers.

A report from the Center for Connected Health Policy said that implementing the provisions in AB 415 could lower the cost of care for Medi-Cal, California's Medicaid program, by more than $1.3 billion each year. For example, these savings would come from disease management programs that use electronic home monitoring systems to track patients' vital signs or medication adherence, which are measures that can help prevent hospital readmissions for patients with chronic diseases.

In his reaction to the passage of AB 415, Jon Linkous, CEO of the American Telemedicine Association (ATA), said that by eliminating outdated requirements that restrict a patient's ability to receive remote health services via video or store and forward, the law will let healthcare providers in California use modern technology to improve care, increase access, and lower costs. He also said the ATA estimates that the use of telehealth technologies has doubled in the last two years and is growing at a fast clip. The law, therefore, addresses the expanded use of telehealth as a way to improve the quality of care.

"California's new law is a significant step forward for telehealth and serves as a challenge for other states to adopt similar legislation," Linkous told InformationWeek Healthcare. "While several states have adopted legislation expanding the use of telehealth, California has clearly taken the lead and the residents of the state will benefit from its leadership in this area."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AWESTERINK024
50%
50%
AWESTERINK024,
User Rank: Apprentice
11/4/2011 | 2:01:24 PM
re: California Tightens EHR Security
California has laid the groundwork for so many of the healthcare IT regulations that we see today. I have to wonder if this legislation will pave the way for national EHR security legislation. Knowing how important innovation is to continued EHR development the prospect of this bill advancing standardization is a bit concerning. http://www.vitalblog.com
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1575
PUBLISHED: 2019-07-16
Information disclosure in PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2 and earlier may allow for an authenticated user with read-only privileges to extract the API key of the device and/or the username/password from the XML API (in PAN-OS) and p...
CVE-2019-1576
PUBLISHED: 2019-07-16
Command injection in PAN-0S 9.0.2 and earlier may allow an authenticated attacker to gain access to a remote shell in PAN-OS, and potentially run with the escalated user?s permissions.
CVE-2018-19629
PUBLISHED: 2019-07-16
A Denial of Service vulnerability in the ImageNow Server service in Hyland Perceptive Content Server before 7.1.5 allows an attacker to crash the service via a TCP connection.
CVE-2019-10100
PUBLISHED: 2019-07-16
Quake3e < 5ed740d is affected by: Buffer Overflow. The impact is: Possible code execution and denial of service. The component is: Argument string creation.
CVE-2019-10100
PUBLISHED: 2019-07-16
UPX 3.95 is affected by: Integer Overflow. The impact is: attacker can cause a denial of service. The component is: src/p_lx_elf.cpp PackLinuxElf32::PackLinuxElf32help1() Line 262. The attack vector is: the victim must open a specially crafted ELF file.