Sie sind auf Seite 1von 6

Medical Record Privacy: Is it a Façade?

Aubrey Baker Abstract


Virginia Tech Part of the job of healthcare providers is to manage
250 Durham Hall patient information. Most is routine, but some is
Blacksburg, VA 24060 USA sensitive. For these reasons physicians’ offices provide
AABaker@VT.edu a rich environment for understanding complex,
sensitive information management issues as they
Laurian Vega pertain to privacy and security. In this paper we
Virginia Tech present findings from interviews and observations of 15
2202 Kraft Drive offices in rural-serving southwest Virginia. Our work
Blacksburg, VA 24060 USA demonstrates how the current socio-technical system
Laurian@VT.edu fails to meet the security needs of the patient. In
particular, we found that the tensions between work
Tom DeHart practice and security, and between electronic and paper
Virginia Tech records resulted in insecure management of files.
2202 Kraft Drive
Blacksburg, VA 24060 USA Keywords
TDeHart@VT.edu Healthcare, security, usable security, privacy, work
practice
Steve Harrison
Virginia Tech ACM Classification Keywords
2202 Kraft Drive H.5.3 [Information Systems] Group and Organization
Blacksburg, VA 24060 USA Interfaces
SRH@VT.edu
General Terms
Human factors, security
Copyright is held by the author/owner(s).
CHI 2011, May 7–12, 2011, Vancouver, BC, Canada. Introduction
ACM 978-1-4503-0268-5/11/05. Traditionally, electronic and physical security have been
concerned with creating rules, locks, and passwords.
However, security systems that neglect people as a important contribution of where security in action is
significant part of the equation “are seldom secure in and is not located.
practice” [3]. Practice is what happens in the moment;
it is the activity; it is what is actually done. It is often in Related Work
the human-centered moment, and not in the computer- The work of usable security in healthcare is an
centered planning stages, when security policies or amalgamation of prior work on healthcare, security,
mechanisms break down and the safety of sensitive and HCI [1]. Patients serve as users, owners of
information is compromised. For this reason we sensitive information, and as part of the healthcare
propose that there exists a need to study socio- system. In regards to security, prior work has
technical systems to understand and evaluate what role demonstrated balance is essential between policies and
both humans and technology play in creating usable software solutions that are constructed accounting for:
security [1]. Specifically, we propose focusing on social and organizational context, temporal factors from
physician’s offices, where there is a plethora of actions in that context, possible threats from
sensitive patient information that exists in various information usage, and trade-offs made by the user
stages and forms of documentation. Physicians’ offices [1]. Some considerations would be the location of
are valuable loci of study given the collaborative nature computers and paper files within the physician’s office
of the work, the increasing adoption of electronic and users being inconvenienced by extra steps, such as
medical records [6], and the implicit assumption of using a password every time they return to a computer
security by the patient. or putting files back on the shelving unit in between
frequent access. These factors demonstrated that all
Prior work has documented that when systems are solutions are not technical: the social context must be
provided to users that do not account for how they accounted for in order to fully represent the needs of
work, the system is circumvented and used the users – as argued more generally in the work of
“inappropriately” [2-4]. Within secure places, this can Palen & Dourish [4]. Despite the need for such context,
mean writing down passwords, or as was observed in there has been little work done in real social practices
this study, shouting them. This is because the in regards to privacy and security. Thus, our work is a
management of patient information is both socially valuable contribution to the growing need of
constructed and mediated while also being entered and observations in social environments.
navigated in medical record systems. To further discuss
these issues in this paper we present data from In prior work within the medical context, Adams &
interviews and observations of 15 physicians’ offices in Blanford [1] discussed with members of two hospitals
Southwest rural-serving Virginia to continue the the use of passwords to protect access to sensitive data
discussion of usable security within a particular location when computers were unattended. They found that
and with a focus on practice. By focusing on practice many users were simply ignoring the password
within physicians’ offices our work represents an protection system -- so many that it became difficult to
enforce the security mechanisms in place. Similarly,
Adams & Sasse discussed that system security often as to the type of centers that were observed due to
lacks “user-centered design and user training” [2]; participant anonymity. All participants were unpaid.
however, users are a critical component in a successful
secure system. Additionally, the adoption of policies The interview protocol was developed and vetted by
such as the Health Insurance Portability and two external researchers to the project. Participants
Accountability Act (HIPAA) are stipulating how users were asked demographic questions, questions in
should be managing patient information, with little regards to their daily information management
consideration for local policies. However, considering practices, and questions in regards to their electronic
security beyond password use has received little systems. Pictures and forms were collected from offices
attention. For this reason we present findings below during interviews. Prior to starting each of the
that include an analysis of security mechanisms that observations each student re-read all prior interviews
extend beyond password usage (or the lack there of). and reports. The observer was centrally located in the
physician’s office and able to watch over the shoulder
Within prior work there have been few examples of of the healthcare staff. Observations were spanned to
qualitative analysis in regards to security and privacy in watch during all times of the day and across days of the
healthcare (with valuable exceptions [1]). Qualitative week where patient load and temporal work rhythms
methods, such as interviews and observations, allowed can vary.
researchers to gain a “deeper understanding of lived
experiences by exposing taken-for-granted We used a phenomenological approach to data analysis
assumptions” by witnessing how “participants live in to derive the essence of security and privacy within
their environment” [5]. In particular, what work that is collaborative management of patient information.
being done has focused on technologically adept Phenomenology is a qualitative method used frequently
locations, with little research regarding those who opt in healthcare research; see [5] for more information
not to use technology [7]. For these reasons we about the details of phenomenology. For our study,
present qualitative data from rural-serving physicians’ data was analyzed by creating a set of themes,
offices in regards to their security practices. clustering the data into sets of meanings, establishing
agreement between the researchers, and then
Methods examining the resulting body of data related to the
Fifteen interviews were conducted with directors of essence of security and privacy.
physicians' offices; and, 61.25 hours of observation
were carried out at 5 locations. The participants had, on Results
average, 20.16 years of experience as a director. The We present these results not to point at any one place
average staff size was 10 people with approximately where security and privacy were not accounted for.
128 patients seen weekly. All offices provided non-life- Instead, we present these results to provide interlaced
critical care. Given the dearth of diversity of physician’s examples to construct a broader understanding of
offices, more identifying information cannot be provided security and privacy.
Password Sharing additional instances represented in interviews about
There were two instances where a participant with similar lack of password use.
special access would log in for another office member
with a lower level access or no When asked why the staff did not use passwords one
access at all to utilize the system. director responded that the staff at her office use each
In one case, it was observed that other's machines because everyone "has the same
the employee that worked primarily access" and "there is really no privacy act between
with Medicare needed to log into employees." Because everyone has the same
the hospital’s electronic database to permission, there is not a need to have an explicit rule
collect information. However, she specifying that they can or cannot use each other’s
had not attended the required computer. This fact is inherent in the work that they do
course and received her own and the information that they are all allowed to
individual access. To get this see/access/modify.
information she asked one office
staff who did have this access to Difficulty Locating Patient File
log her in. What is important and There were fourteen occurrences of medical staff
relevant is that this same office did having difficulty locating patient files. This was because
not use any passwords for their of the participant’s inability to use the system – either
Figure 1. One participants patient’s files open for own electronic medical record electronic or paper – that breakdowns occurred. These
anyone to access. system. breakdowns resulted in additional patient files being
created, files not being in the correct location, and lost
General Lack of Passwords patient information. The remaining instances were
Even more prevalent was the complete lack of derived from observations of three physicians’ offices.
password use. There was only one observed use of Example causes for these problems are unusual
passwords to enter an individual center’s electronic spellings of names, transposed names, and office staff
system. During interviews we additionally learned that misspelling and/or misfiling. These problems are
of the physician’s offices that did have electronic interrelated because the patient’s name was the
systems, only 6 even used passwords. For instance, the primary and only key for locating a patient’s file at
observer writes while watching the director, “<the these offices. When a patient’s file could not be located
director> brings a paper over and punches it on the based on the primary key, it was difficult it not
counter next to me. She leaves her office with it, impossible to find the file again.
leaving her computer unlocked.” This example is
canonical of how office staff would (a) leave their Electronic Systems Crashing & Loosing Information
computers open when they would leave their Out of the nineteen physician’s offices that we visited,
workstation, and (b) the general lack of concern about eighteen of them had some form of electronic records
leaving a computer insecure. There were three used to manage their patient’s care. There were five
instances where the offices’ electronic system crashed passwords because of the social nature of their work.
and lost pertinent information. One director explained Passwords ascribe to a one user – one machine – one
how her office had been making automated electronic account system. Yet, the work that people do is open,
back-ups when they experienced a fatal crash. This social and shared across both the electronic and paper-
crash led to the discovery that the back-ups had not based systems. Researchers may surmise that these
been properly collected for three weeks. As a result the findings are not surprising. However truthful that may
director “worked a lot of weekends” in order to re-enter be, the question remains, why are designs not
all of the lost information back into the electronic accounting for them. Our work represents a first take at
system from their paper records, which they had still trying to understand and account for these
been maintaining. Similar experiences occurred at the phenomenon and point at future design considerations.
other practices. All offices still had their paper-based For this reason we present the following issues in
files. relation to designing a system that is beyond usable for
managing patient information, but also social.
Patient Information Left in the Open
There were two incidents where private patient Passwords are Not Social
information was mistakenly left out of a patient's file The breakdown in password utilization and personal
which resulted in the information being exposed. password security reflect that the need for this feature
During an observation the observer noticed a patient x- is not represented in the work carried out in systems
ray that was left on the counter that was detached from that have password functionality. Because users do not
a patient’s file. A nurse came over, randomly picked up see the need for passwords, individual passwords are
the x-ray, looked at it, and then put it back on the not used. Similarly, office staff often leave information
desk. All offices had patient records freely available to out of files or do not return files to shelves
anyone to access as shown in Figure 1. No filing immediately. This means that systems should account
cabinets were observed to be locked at night. for quick access to information not based on
restrictions, but upon making knowledge of who is
Discussion & Conclusion accessing the system visible to all. Additionally,
These findings present obvious security risks of breaking away from the one person – one computer –
confidential patient information within physicians’ one account model of supporting access to information
offices, whether those risks are the loss of crucial would better support social work.
information or exposure of sensitive material. In order
to progress toward a more usable system, it is essential Systematic Flaws
to identify why these phenomena are occurring to Electronic record systems crashing, data backups
assist in presenting a usable solution for these security failing, difficulty of locating patient files, and leaving
risks. However, it is critical to recognize the social files in the open can all be attributed to flaws within the
nature of how patient information is currently being socio-technical system. The unreliability of electronic
managed. Staff share passwords or do not use systems require practices to maintain their paper files
as a reliable backup source, resulting in twice the These are not flaws of malice, but flaws of negligence
amount of files to maintain and twice the amount of where the work of making patient information secure
data to secure. Leaving information out of files or files and private is not clearly embodied in the practice of
off the shelf, even temporarily in between uses, is in managing patient information. Our future work is to
direct conflict with keeping the information secure in respond to these issues by prototyping solutions that
the sense that it is not locked away and protected from do represent the social needs of information
prying eyes. Redundant information represents a management. Additional work should be done to
system flaw in regards to security, but was created to identify the costs and benefits of open access systems,
support the social system. Designers should consider especially in life-critical situations.
the affordances of paper files that are difficult for
electronic systems such as having a physical location, Acknowledgements
recognizable handwriting, and spotting inconsistencies We thank Laura Agnich for helping collect and analyze
in the system (e.g., missing information within a file). the data and the VT Usable Security Group for their
feedback. This work was funded, in part by NSF Grant
Is Patient Privacy a Fallacy? #0851774.
Further improvements can be made to enhance the
reliability and security of electronic systems. Updates References
can be tracked as well as regular backups that alert the [1] Adams & Blandford (2005). Bridging the gap
system administrator when they fail to run successfully. between organizational and user perspectives of
security in the clinical domain, IJHCS, 63(1-2).
Additionally machine learning algorithms can process
individual user access to patient files in order to identify [2] Adams & Sasse (1999). Users are not the enemy.
Communications of the ACM, ACM.
unusual behavior. For example, if a nurse is updating
the file of patient X, she will access and update X’s file [3] Bellotti & Sellen (1993). Design for Privacy in
multiple times. However, if a nurse were to look at the Ubiquitous Computing Environments, Conference on
CSCW, Kluwer Academic Publishers.
file of patient Y, her neighbor, she would only have a
need to look at the file once. This unusual pattern could [4] Palen & Dourish (2003). Unpacking "privacy" for a
networked world, Conference on Human Factors in
then be reported for investigation.
Comp Sys, ACM.

However, solutions like these can be accused of [5] Starks & Trinidad (2007). Choose your method: A
comparison of phenomenology, discourse analysis, and
throwing more technology at the problem without
grounded theory, Qual Health Res, 17(10).
accounting for the work that people do. A tenant of
[6] Berner, Detmer & Simborg (2005). Will the Wave
usable security literature states that people will find a
Finally Break? A Brief View of the Adoption of Electronic
way to circumvent a security measure when it comes in Medical Records in the United States, JAMIA, 12(1).
conflict with another task. We therefore have presented
[7] Satchell & Dourish (2009). Beyond the user: Use
the previous security issues that demonstrate security and non-use in HCI, OZCHI, ACM.
flaws in the everyday work of a physician’s office staff.

Das könnte Ihnen auch gefallen