Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

International Journal of Medical Informatics 60 (2000) 151 – 157

www.elsevier.com/locate/ijmedinf

Practical approaches to creating a security culture


Nicholas Gaunt
Plymouth Hospitals NHS Trust, Derriford Road, Plymouth, De6on PL6 8DH, UK

Abstract

Security of information in the health care environment depends not so much on technical controls as on compliance
with policy by all those who use the information. Awareness of policy and observance of a code of conduct, whilst
important, do not itself ensure that staff respect confidentiality, let alone follow other measures to secure records. A
culture of security must be developed throughout the health care community. This demands clear policy with practical
procedures that are relevant in the workplace, a long-term programme in which changes can be introduced in a
managed way that is sensitive to the tensions between security and other working practises, commitment from senior
management to achieve change, and strong leadership from within the health care professions. The UK National
Health Service has begun such a process with the endorsement of the ‘Caldicott Committee Report on the review of
patient-identifiable information’ and its recommendation that all health organisations appoint a senior health care
professional to be responsible for confidentiality of patient information. Raising the political profile of patient
confidentiality has served to change the rate of change up a gear. The response of one health care community to this
initiative will be discussed and lessons drawn regarding cultural change and information security. © 2000 Elsevier
Science Ireland Ltd. All rights reserved.

Keywords: Computer; Security; Policy; Confidentiality; Patient records

1. Introduction records about their patients. Data controllers,


whose responsibility is to prevent unautho-
Maintaining the security of health care rised access and to ensure the integrity and
data is not merely a matter of application of availability of the information, would like to
technical controls and procedures. Various impose constraints on the use of personal
tensions between data subject, data user and data, in line with regulatory frameworks.
data controller preclude such a simplistic ap- Data subjects want their personal details kept
proach. Health care professionals require ac- confidential and accurate but also want to
cess to health care data to fulfil their duties to receive the best possible care, which in mod-
the patient and most would like unfettered ern medical practice implies the sharing of
access to the entire collection of clinical their information between many different
professional care groups. Health insurers, ad-
E-mail address: nick.gaunt@phnt.swest.nhs.uk (N. Gaunt). ministrators, government departments and

1386-5056/00/$ - see front matter © 2000 Elsevier Science Ireland Ltd. All rights reserved.
PII: S 1 3 8 6 - 5 0 5 6 ( 0 0 ) 0 0 1 1 5 - 5
152 N. Gaunt / International Journal of Medical Informatics 60 (2000) 151–157

professional regulatory bodies are demanding Reluctance to change working practices in


greater detail about care delivery and clinical order to make information more secure is
performance, putting in jeopardy the privacy widespread amongst health care profession-
of the patient and clinician alike. Human als. Despite their general acceptance of the
rights groups are campaigning for personal principle of patient confidentiality, health
privacy and the right of the individual to care professionals tend not to accept respon-
have access to the data recorded about them. sibility for information security.
Balancing these many and often conflicting
expectations is the greatest challenge to those 2.2. Ignorance
attempting to develop a culture in which
personal health care information is processed This reluctance is due in part to a poor
securely. This paper considers some of the understanding of the measures necessary to
impediments to change towards a security achieve security (many of which are very
culture and how they may be overcome, us- simple and easy to observe). Doctors are a
ing one health care community as an particularly difficult group to teach about
example. information security since they often believe
they know all about confidentiality (through
the Hippocratic Oath) and that other aspects
of security are not their problem. Unfortu-
2. Impediments to change
nately, whilst they know about the principle
of confidentiality, doctors’ knowledge of the
2.1. Attitudes potential threats to computer systems and
how they can best be prevented may be poor.
The most significant threat to the security Information security, data protection and hu-
of information in an organisation is its staff. man rights should be a prominent part of
It follows that an important measure of suc- medical informatics courses during under-
cess in implementing a security policy is that graduate training and in postgraduate educa-
all groups of staff are aware of, agree with tion. It is unfortunate that an ever-expanding
and observe procedures aimed at preserving medical curriculum has resulted in informat-
security of information. However, this is by ics being omitted completely from many
no means easy to achieve since it requires courses.
significant change in behaviour of staff. In-
deed, many health care professionals are still 2.3. Conflicting demands
reluctant to use computers at all and to be
asked, for instance, to remember a new pass- It is not only in the medical curriculum
word every month only hardens their atti- that information security has been sup-
tude. Health care organisations have pressed. The attitude that protection of pa-
knowingly compromised information security tient information is less important than direct
through less than satisfactory access controls patient care pervades planning and provision
simply in order to encourage all staff to use of clinical services in general. Obtaining ade-
the computer systems. Once such compro- quate funding for information security in an
mise has been adopted, it is subsequently environment of limited resources, therefore,
very difficult to convince users of the need to becomes a significant challenge. Indeed, the
strengthen access control. expense of installation and maintenance of
N. Gaunt / International Journal of Medical Informatics 60 (2000) 151–157 153

additional security controls is often cited as a cial gain in incorporating more stringent con-
reason for failure to adopt them. trols, or the purchasers have been unwilling
In addition to financial constraints, there to pay for, or to implement, more secure
are increasing demands for access to personal systems. Poorly designed security controls of-
health care data for the purposes of monitor- ten impose constraints or impediments to
ing, regulation, audit and research. Managed access that are unacceptable to clinical staff.
care organisations, insurance companies and Even passwords are considered by many to
health authorities contracting services are be awkward and unnecessary, particularly
seeking access to patient records to substanti- when enforced expiry is imposed. Re-estab-
ate claims or detect fraud. Investigations un- lishing network connections can take so long
der the aegis of clinical governance or that busy clinical staff avoid logging off be-
medical audit gather patient data to examine tween transactions on network workstations.
the performance against criteria of health Security measures must be practical, accept-
care workers. Surveillance, epidemiology and able to staff and cause minimal disruption to
research programmes systematically gather the processes of care. Few commercial sys-
the patient clinical data to monitor health tems at present achieve these ideals. How-
care practices and understand distribution, ever, once appropriate access control and
spread and control of diseases. The police auditing is installed, staff scepticism soon
seek information from medical sources that turns to acceptance as they come to realise
may lead to the identification of criminals or their importance and benefit [2].
to the prevention of crime. It is the ready
availability of large quantities of clinical in- 2.5. Inconsistent policies
formation on computer systems that has
made such investigations possible and of ap- The extent, to which individual health care
peal to regulators and the public. The laud- facilities apply security controls to their own
able aims of greater efficiency, accountability, computer systems, can vary markedly. Incon-
liability and knowledge achieved through sistent policies and procedures can lead to
such systematic data processing are, however, frustration, confusion and potentially even
putting at risk the fundamental principle of harm to patients. This is exemplified by dif-
patient confidentiality [1]. The balance be- ferences in organisation’s policy towards
tween openness and confidentiality is the sub- transmission of patient information by fac-
ject of much debate, which, while it remains simile. Whereas best practice is to send pa-
unresolved, prevents application of a consis- tient-identifiable information by facsimile
tent approach to the protection of clinical machine only in emergencies and according
information. to agreed protocols, the convenience of such
means of communication has led many or-
2.4. Inadequate systems ganisations to allow their routine and uncon-
trolled use. An organisation attempting to
Given the availability of many good tech- apply more restricted use of facsimile trans-
nical solutions to achieving secure systems, it missions is then faced with complaints from
is disappointing that few of the commercial other organisations with more lenient policies
health care computer systems currently on whose staff are frustrated that they cannot
the market have more than the most basic send or receive patient information by that
security features. Either there is no commer- means.
154 N. Gaunt / International Journal of Medical Informatics 60 (2000) 151–157

Many similar inconsistencies in security 1. However much the organisation accepts


policies are becoming evident the more that the principles of security, it is continually
patient-identifiable information is being com- faced with competing demands for re-
municated across organisational boundaries. sources and attention, often from external
There is a growing need for commonality in sources and frequently with a political
security policies and negotiated agreements imperative, resulting in security initiatives
between agencies that are sharing patient being postponed, abandoned or compro-
information. mised. Only with similar external pressure
Without a clear framework of responsibil- to implement security policy can we hope
ity and accountability, such agreements will to sustain these initiatives locally.
be difficult to achieve. 2. Training 3500 staff in information secu-
rity on joining the organisation and
through annual update has been very de-
manding and has failed to reach some
3. Effecting cultural change sectors, most notably medical staff.
Greater emphasis on security is needed
Each health care facility should have a during medical training, and continued
clear information security policy. The success responsibility for security should be pro-
of such a policy in effecting change of culture moted through clinical governance.
in the organisation depends on its appropri- 3. It has not yet been possible to instigate a
ateness, practicality and acceptance by all process whereby staff are formally re-ac-
staff [3]. The most important influence on credited and re-affirm their commitment
staff attitude is a demonstration of the com- to confidentiality and security on an an-
mitment to security by key opinion formers nual basis. Instead, reliance is placed
in each staff group. With their support and upon contractual clauses and codes of
involvement introduction of policy and pro- conduct.
cedures is generally straight-forward whereas 4. Differences of security policy in organisa-
without them, the task is much more difficult. tions, with which we share patient infor-
Sensitivity to the opinion of staff and the mation, such as the problem of facsimile
impact of security controls on their working transmission described earlier, have made
environment is essential during policy devel- it difficult to implement our own
opment and implementation, and can be procedures.
gained through user participation [4]. As a It became evident that without clear na-
minimum, there should be representation tional direction and a framework of account-
from the main staff groups on the committee ability for information security, it would be
responsible for development and implementa- difficult to progress further with these aspects
tion of the organisation’s information secu- of our local policy.
rity policy.
The installation of an information security
policy in Plymouth Hospitals NHS Trust has 4. Caldicott committee
been described elsewhere [5]. Despite a grad-
ual rising awareness of security, its effective In recognition of increasing concern about
implementation has remained a challenge, for the ways in which the information is used in
several reasons. the National Health Service (NHS) in Eng-
N. Gaunt / International Journal of Medical Informatics 60 (2000) 151–157 155

Table 1 Table 1 (Continued)


Recommendations of Caldicott committee
12 Where practicable, the internal structure and
1 Every dataflow, current or proposed, should administration of databases holding patient
be tested against basic principles of good identifiable information should reflect the
practice. Continuing flows should be principles developed in this report
re-tested regularly 13 The NHS number should replace the
2 A programme of work should be patient’s name on Items of Service Claims
established to reinforce awareness of made by General Practitioners as soon as
confidentiality and information security practically possible
requirements amongst all staff within the 14 The design of new systems for the transfer of
NHS prescription data should incorporate the
3 A senior person, preferably a health principles developed in this report
professional, should be nominated in each 15 Future negotiations on pay and conditions
health organisation to act as a guardian, for General Practitioners should, where
responsible for safeguarding the possible, avoid systems of payment which
confidentiality of patient information require patient identifying details to be
4 Clear guidance should be provided for transmitted
those individuals/bodies responsible for 16 Consideration should be given to procedures
approving uses of patient-identifiable for General Practice claims and payments,
information which do not require patient-identifying
5 Protocols should be developed to protect information to be transferred, which can
the exchange of patient-identifiable then be piloted
information between NHS and non-NHS
bodies
6 The identity of those responsible for
monitoring the sharing and transfer of
information within agreed local protocols
land and Wales, and the need to ensure that
should be communicated clearly confidentiality is not undermined, the Chief
7 An accreditation system which recognises Medical Officer of England commissioned a
the organisations following good practices review of the use of patient-identifiable infor-
with respect to confidentiality should be mation, the findings of which were published
considered
in December 1997 [6]. The review examined
8 The NHS number should replace other
identifiers wherever practicable, taking patient-identifiable information, which passes
account of the consequences of errors and from NHS organisations to other NHS or
particular requirements for other specific non-NHS bodies for purposes other than di-
identifiers rect care, medical research, or where there is
9 Strict protocols should define who is a statutory requirement for the information.
authorised to gain access to patient identity
where the NHS number or other coded
Its purpose was to ensure that patient-iden-
identifier is used tifiable information is only transferred for
10 Where particularly sensitive information is justified purposes and that only the minimum
transferred, privacy enhancing technologies necessary information is transferred in each
(e.g. encrypting identifiers or ‘patient case. To this end, 86 flows of information were
identifying information’) must be explored
mapped relating to a wide range of planning,
11 Those involved in developing health
information systems should ensure that best operational or monitoring purposes.
practice principles are incorporated during Sixteen recommendations were made (see
the design stage Table 1), of which perhaps the most signifi-
156 N. Gaunt / International Journal of Medical Informatics 60 (2000) 151–157

cant was the support for professional respon- 5. Community-wide initiative


sibility for safeguarding the confidentiality of
patient information. Specifically, this entailed The local health care community of South
the nomination in each health organisation of and West Devon serves a population of
a senior person, preferably a health profes- 650 000. It comprises three NHS Trusts,
sional, to act as a guardian. This was a which provide secondary and tertiary care in
welcome ratification of our local security pol- two District General Hospitals and also men-
icy, which identified medical responsibility tal health and other community services; five
for clinical information security, and served general practice Primary Care Groups, which
to raise the priority of information security in provide primary care to the community; a
the organisation. Guidance to ‘Caldicott Health Authority, which co-ordinates provi-
Guardians’ was subsequently issued and a sion of health care; an out-of-hours general
brief national training programme was practice service; an ambulance service; and
delivered. three Local Authorities, which provide social
Caldicott Guardians have been given a services to the local population.
substantial agenda with requirements to con- Recognising that many of the tasks facing
duct management audits and deliver annual Guardians are common to all health care
plans and out-turn reports to the NHS execu- organisations, including the development of
tive. They are responsible for achieving agreements between agencies, we have estab-
lished a community-wide Guardians Group.
agreement with respect to, and reviewing in-
The Group includes the Caldicott Guardians
ternal protocols governing the protection and
from all the above health care organisations
use of patient-identifiable information by the
and representatives from the three Local Au-
staff of their organisation and for the disclo-
thority Social Services Departments, who are
sure of patient information across organisa-
not currently subject to the Caldicott Report
tional boundaries. They also have a strategic
but, nevertheless, share patient information.
role, developing security and confidentiality The Group has become the focal point for
policy, representing confidentiality require- preparation of many common policies and
ments and issues at Board level, advising on protocols on the use and transfer of patient
annual improvement plans, and agreeing and information, and has considered amongst
presenting annual outcome reports. Tasks in- others protocols for the disclosure of infor-
clude the review of data flows in their own mation to the police under the Crime and
organisations; negotiation of confidentiality Disorder Act and for the safe use of facsimile
agreements with organisations with which pa- machines and electronic mail for patient-
tient-identifiable information is shared; identifiable information.
preparation of codes of conduct for all staff The Group provides mutual support
groups; and determining appropriate levels of through sharing of documents and discussion
access to patient information. of issues of common concern. This is leading
Given that Guardians are generally health to a gradual convergence of policies and is
care professionals without prior knowledge setting the framework for information
of, or training in information security, they sharing within the community. It will be re-
need education, advice and technical support. sponsible for developing the security policy
There is presently no regional or national for the shared Electronic Health Record soon
framework to which Caldicott Guardians can to be developed in the community as a part
turn for such support and advice. of the NHS strategy ‘Information for Health’
N. Gaunt / International Journal of Medical Informatics 60 (2000) 151–157 157

[7]. Similar groups are now being formed in References


other communities in England.
[1] P.S. Appelbaum, Threats to the confidentiality of
medical records — no place to hide, J. Am. Med.
Assoc. 283 (2000) 795 – 797.
6. Conclusion
[2] I. Denley, S. Weston Smith, Privacy in clinical
information systems in secondary care, Br. Med. J.
Whereas local attempts had been only par- 318 (1999) 1328 – 1331.
tially successful, application of a regulatory [3] S.M. Furnell, P.N. Gaunt, R.F. Holben, P.W.
framework, clear lines of accountability, and Sanders, M.T. Stockel, M.T. Warren, Assessing
defined clinical responsibility are leading to a staff attitudes towards information security in a
greater awareness of information security, European healthcare establishment, Med. Infor-
matics 21 (1996) 105 – 112.
greater willingness to invest in change and to
[4] M.J. Warren, P.N. Gaunt, Addressing the impact
co-ordinate between all facilities in a commu- of security on a healthcare environment, Int. J.
nity. Nevertheless, a genuine security culture in Biomed. Comput. 35 (1994) 269 – 271.
which the time-honoured principle of the [5] N. Gaunt, Installing an appropriate information
confidential patient-doctor consultation is security policy, Int. J. Med. Informatics 49 (1998)
honoured without preventing modern day re- 131 – 134.
[6] The Caldicott Committee: report on the review of
quirements for multi-disciplinary, inter-agency
patient-identifiable information, December 1997,
co-ordinated health care, incorporating ac- NHS Executive, London.
countability, clinical governance, audit, re- [7] Information for Health: An Information Strategy
search and external monitoring by regulatory for the NHS, September 1998, NHS Executive,
bodies and insurers, is still a long way off. London.

You might also like