Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.
10.4258/hir.2012.18.2.125
- Author:
Kiho YEO
1
;
Keehyuck LEE
;
Jong Min KIM
;
Tae Hun KIM
;
Yong Hoon CHOI
;
Woo Jin JEONG
;
Hee HWANG
;
Rong Min BAEK
;
Sooyoung YOO
Author Information
1. Center for Medical Informatics, Seoul National University Bundang Hospital, Seongnam, Korea. yoosoo0@snu.ac.kr
- Publication Type:Original Article
- Keywords:
Mobile Electronic Medical Record;
Mobile Picture Archiving and Communication System;
Mobile Health Information System;
Mobile Security;
Smart Health Security
- MeSH:
Compliance;
Electronic Health Records;
Humans;
Intelligence;
Jurisprudence;
Security Measures
- From:Healthcare Informatics Research
2012;18(2):125-135
- CountryRepublic of Korea
- Language:English
-
Abstract:
OBJECTIVES: The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. METHODS: The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. RESULTS: From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. CONCLUSIONS: This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.