You are on page 1of 6

Proceeding of The 1st International Scientific Meeting On Health Information (1st ISMoHIM)

SECURITY FEATURES IN ELECTRONIC MEDICAL RECORD


Abdillah Azis1, Naufal Farah Azizah2
1
Sekolah Vokasi, Universitas Gadjah Mada, Sleman, 552811
E-mail: abdillahazis69@gmail.com
2
Sekolah Vokasi, Universitas Gadjah Mada, Sleman, 552812
E-mail: nazizah87@gmail.com

Abstract should not violate the secrecy in it. The release


of information in this case holds the legal aspect,
Abstract Medical Record is the file containing
namely as the legal aspects of the evidence of patient
the records and documentation of the patient’s
care. It is explained that medical records can be used
identity, examination, treatment, action, and other
at any time in case of misuse of the information on a
services that have been given to patients. Forms of
person’s medical history because it is basically the
medical records not only in the form of the document
nature of the medical record file is confidential.
data / paper but can be any electronic data. Medical
records not only the manually but also have started Forms of medical records not only in the form of
switching to electronic. There is no of special rules the document data / paper but can be any electronic
on electronic medical records to make patient data data. Medical records not only the user but also have
security systems is not guaranteed. The research started switching to electronic. Institute of Medicine
method is a literature review. The results showed (1999) describes a computer-based health record
that the security features of electronic medical (Computer-based patient records / CPR) is a patient
records that should be included; feature authority record is done electronically and take shelter in a
or right to access, search feature or audit record, specially designed system. Usefulness support users
authentication feature, documentary feature, feature in accessing the data are complete and accurate, ie
technical services, feature recovery data. by giving a warning, alert and clinical decision-making
support system that references the data source of
medical knowledge and other means (Hatta, 2008).
Key Words: Electronic Medical Record, security
features, feature authority, audit features, The absence of legislation specifically governing
authentication feature, documentary feature. the EHR makes the implementation of EHR is not
functioning optimally, including in the field of data
security. As for not issuing a special accreditation
from the electronic health record systems Hospital
Accreditation Committee (KARS) makes the absence
1. Introduction
of the minimum standards of electronic health record
According Permenkes 269 in 2008, the Medical
systems. Their accreditation electronic health record
Record is the file containing the records and
to support the development of electronic health
documentation of the patient’s identity, examination,
record systems are becoming more advanced and
treatment, action, and other services that have
more certainly ensure the security of the data from
been given to patients. In the execution of works,
the patient.
Kepmenkes No 377 Tahun 2007 aspects of medical
records is ALFRED. ALFRED an abbreviation
of Administration, Legal, Financial, Research, 2. METHOD
Education and Documentation. This study is a descriptive.
It was generally recognized that information
obtained from medical records confidential. The
information in the medical record is confidential
3. Result
because it explains the special relationship between Electronic Health Record Related Legal Aspects
a patient with a doctor that must be protected in
RKE is the basis for the Undang-Undang
accordance with the code of medical ethics and laws
Republik Indonesia No 11 Tahun 2008 on information
and regulations in force. But in some cases, medical
and electronic transactions “electronic document is
information should be released to the patient’s needs
any electronic information created, forwarded, sent,
such as insurance or legal cases. In this case, the
received or stored in the form of analog, digital,
medical information needs to be released, but it
optical, or electromagnetic,, the like, which can

ISBN: 978-602-73865-5-1 65
Proceeding of The 1st International Scientific Meeting On Health Information (1st ISMoHIM)

viewed, displayed and/or heard via computer or can only access certain menu in accordance with
electronic systems, including but not limited to text, their authority. Eg outpatient admissions officers can
sound, pictures, maps, plans, photographs, or the only access the menus related to enrollment. The
like, letters, signs, numbers, access Code, symbols authorization boundary between the superintendent
or perforation that have a meaning or meaning or can and his staff, for example medical records staff and
be understood by people who are able to understand the head of the medical record. head of the medical
it. “Advantages of electronic health record-based records are able to access what is accessed by
enabling broad access to comprehensive and timely the staff of the medical record. but some parts of
health information for health workers and other the menu can only be accessed by the head of the
authorities. Computerization greatly enhance the medical record.
protection of confidentiality of information. Trace Search Feature. This feature serves
Confidentiality of Medical Data to monitor the services received by patients. This
feature is necessary as the legal aspects in medical
One of the obligations of health information
records or financial aspects of the medical record.
practitioners are maintaining the confidentiality of
This feature berungsi to monitor every operation /
medical data. Secrecy is as supporters the legal
access to information systems. The current system
aspects of medical records containing medical data.
is able to monitor and record user activities into a
Confidentiality of information is any information
trace file search.
derived from clinical relationship between patient and
health care institutions. This information includes all Features Data Recovery function to recover
patient medical data and social data of the patient. data if the system is experiencing interference such
as power failure, natural disaster or a virus. features
Every medical information that is owned hospitals
of post-disaster recovery is a process that allows to
should not be spread by an employee of the hospital,
recover data lost or damaged after the occurrence
except when it allows hospital administrators.
of a disaster disturbance such as fire, flood, riot, or
Hospitals should not be at will using medical records
system failure. Security system in BBKPM Surakrta
in a way that could harm the interests of the patient,
to rescue affected by the disaster patient data when
unless the hospital itself will use the medical records
using antivirus. In the event of damage to a computer
when necessary to protect themselves or represent it.
will not affect other computers.
Confidentiality of medical data can be viewed
Feature integration of health management
as a matter of privacy. Simply put, secrecy means to
information system that is implemented is prepared
keep a secret. This implies that there are two parties
to set up filling multiple data items so that the user
involved and blocking data leaks to third parties .
is required to fill it. It aims to maintain the quality of
Confidentiality only become an issue if a third p is
the data item and patient care. Item patient’s identity
involved, only if necessary to release the information.
is distinguished by red marked posts (personal data
Security Features EMR at the Balai Bessar of patients) and black (social data of patients). Red
Kesehatan Paru Masyarakat Surakarta mark an item of data that is required. Storage process
Features Authentication is about verifying can not run if the item is not filled completely. So
whether someone is who they claim to be. Usually the completeness of the data is the main thing in
involves a username and password, but can include the beginning of the process of patient data input,
other methods of demonstrating identity, such as for more complete patient data, the data is capable
smart cards, fingerprint. BBKPM authentication used mmenunjukkan kulitasnya. Data quality is a reflection
in the outpatient information system in the form of of the quality of service.
a username and password to access the SIMKES. Security features secure storage and
Username and password at the start of use specified transmission media systems developed today have
by the admin, then users may change their own. the ability to control the export and import functions
When users enter an incorrect password, the system aktifiatas data. Media pnenyimpanan used is the hard
will give an error message “your user ID or password drive, and external hard drive. Transmission medium
is incorrect.” To the users. This system not yet have used is a LAN (Local Area Network). Switch or hub
the ALO (automatic Log Out). installed in each unit to make sure to avoid delays
Features authorization is a feature that limits the in data transmission. (Rohmadi, 2013)
rights of users to access information in accordance Security Features of EMR Prototype of Papyrus
with the user authority. Thus users can only access a Hospital
menu that has been set by the admin of the system.
The EMR Prototype gives facility for the
Authorization relating to the rights that include
administrator to have the permission to delete user,
validation based access permissions. Each user has
but the user’s history in system is still saved in
a set of rights and restrictions akases by admin so

66 ISBN: 978-602-73865-5-1
Proceeding of The 1st International Scientific Meeting On Health Information (1st ISMoHIM)

audit. EMR Prototype does not have policy “Break regular staff and the head of the medical record).
the glass” yet. The EMR Prototype doesn’t have the Based on CCHIT (2007) administrator reserves the
ability to connects with internet network, so the audit right to control access include (1) the determination
cannot use internet network too. In this audit cannot of access rights for each user, (2) the classification of
see deletion history, but still can use to search user’s each user, (3) restrict users based on transaction time
track and time when the user accesses the system, per day, working part-location, the emergency mode.
although the user already doesn’t have the authority SIMKES at the Center for Public Health Lung new
to enter the system. However, the EMR Prototype Surakarta can assign access rights for each user and
does conversion date entry and time with numbers each user penegelompokan appropriate authority.
or letters into dd-mm-yy (date) and hh-mm-yy (hour). Admin at the Center for Public Health Lung
The EMR Prototype doesn’t provide the facility to Surakarta reserves the right to delete and change
make doctor’s note about special information which the data when an error occurs.Specific information
is specific about their patients. Password and user about patients confidential SIMKES at the Center for
name entry have been used for authentication for the Public Health Lung Surakarta not provide this feature.
EMR Prototype system. It is done for user’s comfort, Based on CCHIT (2007) audit records to
so it will be not easy to get misuse by another parties EMR must comply components: (1) The system is
whose want to force to log in using internet network. equipped with the audit records, (2) the contents of
However, the probability this will happen to EMR the audit records, (3) The ability of the administrator
prototype is small because EMR prototype doesn’t to read the information in the audit records, (4) ability
have internet network, so it will not easy to open the of the system to synchronize time , (5) the ability
data by force by someone outside the system. The to export the system in UTC format, (6) the ability
EMR Prototype can guarantees security technical of the system prohibits unauthorized access to the
service system internet network utilization, so the audit records, (7) the ability to enable and disable
EMR cannot accessed by laptop and smart phone yet administrator audit records, (8) the system supports
Tabel 1 CCHIT Security Standard logging to audit engine.
The system used in the Center for Public Health
No Components Explanation Lung Surakarta able to monitor and record user
1. Security 1. Acces Control activities into a trace file search. Health management
2. Audit information system in BBKPM Surakarta history to
3. Authentification record menu automatically. Admin is able to see
all the user’s activities. Things that are recorded
4. Documentation
in a history file: User identity code (KIP); Date,
5. Technical services
time, duration, and access restrictions.; The menu
2. Realibility 1. Backup/Recovery is accessed; The following types of activity data
2. Documentation accessed the data; Activities related to the access
3. Technical services authorization.
However, this system has not been able to export
(Source: CCHIT, 2007) in UTC format and has not been able to support audit
logging to the engine.
4. DISCUSSION
Authenticatiaon
Based on CCHIT (2007) component access
rights consist of: (1) Limitation of user access rights, Authentication is the mechanism used to
(2) Determination of the access rights of users, (3) validate the identity of users attempting to access
control user access, (4) Elimination of users in the the EMR. There are 13 components used to perform
system, (5) the specific information thus only patients the analysis of authentication. User authentication
confidential, (6) the existence of specific policy called before accessing the protected resource is meant
“Break the glass” to open specific information, and here such as Personal Health Information (PHI) or
(7) Conditions on No. 5 and 6 recorded in audit other mobile pernagkat network. This SIMKES not
records. In detail components such access rights have the ability to connect with your mobile device or
are: Admin on Lung Health of the Great Hall of the internet network. This system has not been able to
People (BKKPM) Surakarta has set access restriction check the strength of passwords. This is evidenced
for each user. Thus users are only able to access the by enabling one character sebgai password to access
menu that has been specified by the admin. Admin the EMR. This system has not been able to do off
at the Center for Lung Health Community (BKKPM) the username and password when the system does
Surakarta have determined the establishment of not function / operated within a certain time. The
user access rights based on the position (between system is able to restrict access speckle consecutive

ISBN: 978-602-73865-5-1 67
Proceeding of The 1st International Scientific Meeting On Health Information (1st ISMoHIM)

incorrect. SIMKES in BBKPM not provide password accessed via a web browser, (5) the system is able
reset facility. But users can menggati username and to protect the integrity of data sent over the internet,
password provided by the admin.. (7) the system stores the data in a format ekripsipada
SIMKES in BBKPM not provide password reset portable media, (8) System supports for storage in
command facilities. Information feedback to the user perangkatmobile, (9) the presence warning message
is important to know the response of the system on upon user login.
the orders that have been made. The system is only Outpatient information system based
able to provide feedback when the username and computerization at the Center for Lung Health
password provided was incorrect in the login process. Community Surakarta using transmission media
Entered user name that is case-sensitive means is LAN (Local Area Network) in order to avoid late
the system’s ability to distinguish income uppercase delivery of data in each unit that has been fitted
or lowercase letters in a user name. switch / hub.Sistem to work for 24 hours without
SIMKES in BBKPM not been able to provide this any uninterruptible power supply ( UPS) to cope
facility revenue username combination uppercase or with blackouts. From these studies not mentioned
lowercase letters on SIMKES BBKPM can get into the outpatient information system based computerization
system. Users can change the password and user at the Center for Public Health Lung Surakarta has
name the first time by admin. Password with alpha- the ability to protect the system through this internet.
numeric characters. Entered password on SIMKES Sistem only use anti-virus that can be updated at any
BBKPM not provide this facility because it is only by time to avoid disruption of the virus from a computer
entering one character in the password already be virus.
allowed into the system.. At the time the password is SIMKES in Surakarta BBKPM still have a
entered the system stores passwords in encrypted weakness for user passwords to limit the number
form (not plain text). of at least 1 (one) karakter.Sistem store data on
The system’s ability to prevent the use of SIMKES using two media are the main hard drive
passwords back. In SIMKES BBKPM not available and an external hard drive. So the system is not yet
this service. users will feel bothered when having to capable of protecting information through the Internet,
remember passwords that have been used so it is not send password entry time passwords, revealing
used anymore. Sutentifikasi system supports parallel password when access via a web browser, protecting
to the NIST 800-63 NIST 800-63 is an authentication the integrity of data sent over the Internet, storing
level 3 support for multi-factor authentication on data in a format ekripsipada portable media, support
the network connection to the Internet. SIMKES in for mobile storage device, and not the message
BBKPM not yet connected to the Internet so that the warning on the currently logged on user. Based on
service is not owned. this, SIMKES in Surakarta BBKPM not meet CCHIT
Based on CCHIT (2007) criteria for documentation standards.
disaratkan in CCHIT EMR system security is a Access Control As Security System Component
documentation system must be equipped with a (Security: Access-Control)
control system configuration and system security
for users. Currently SIMKES to work 24 hours. Ever Based on CCHIT (2007) there are components
damage to the system, which caused service outages in access control : (1) User access control restriction,
further hindered. It will possibly happen sustained (2) user access control determination, (3) user access
damage that could endanger the data that is already control, (4) deletion of user in system, (5) onfidential
stored in the system.The system has two servers special information about patient, (6) the existence
were put in one room, but only one server to be used. of special policy called “Break the glass” to open
Documenting data other than the server and the special information, and (7) caondition in number 5
storage media is also used storage media such as and 6 in audit.
hard drives and external hard drive. These systems Based on CCHIT (2007) administrator has the
do not have documentation of system configuration authority to control access which covers (1) authority
and control system security for users. determination for each user, (2) grouping each users,
Based on CCHIT (2007) technical services (3) restricts user by time transaction each day, part,
security systems on EMR consists of: (1) The work-location, user’s emergency mode.
system’s ability to protect information through the Based on CCHIT (2007) administrator given
Internet, (2) The system sends the password in the ability to set user’s access authority or group
encrypted form, (3) The system does not display by system. So, administrator is user who has the
the password entry time password, (4) ability of authority to all accesses and to determines user’s
the system store data in encrypted format when access, but while administrator runs the activity
corresponds to management decision. In EMR,

68 ISBN: 978-602-73865-5-1
Proceeding of The 1st International Scientific Meeting On Health Information (1st ISMoHIM)

grouping user’s authority access has been done management system (DBMS). “That audit content
to keep the confidential of health information. inmodi_by and modi_date form, which is mean audit
Administrator has the authority to access all of user records staff who has done the activity and also
groups in the EMR Prototype which is consists of the date and the time when the activity has done.
administrator, management, outpatient, nurses, Whereas to delete audit cannot be done because
doctors, laboratories, pharmacy, medical records, audit is congenital in database management system
operator, finance cashier, supervisor and inventory. (Microsoft SQL Server 2005) and cannot appear in
System’s users based on transaction each day, the user’s application except administrator. So that
work-location part, and emergency mode in the EMR user cannot accessed audit system.”(Budi, 2010)
prototype cannot control yet. This control is important The EMR Prototype doesn’t have the ability to
to give access to use system. So, user’s access rights connect with internet network, so the audit doesn’t
in the EMR prototype has been done by (1) user’s use internet network too. However, EMR Prototype
access rights, and (2) grouping users in group. do conversion of date and time entry with numbers
Based on CCHIT (2007) system supports or letters into dd-mm-yy (date) and hh-mm-yy
deletion of user’s rights without deleting user (hour). Based on literature review which can be
from system. The EMR Prototype gives facility to found in EMR prototype doesn’t have audit yet.
administrator to delete user, but the user’s history So that EMR Prototype’s audit not fulfilling (0%)
in system still saved in audit. CCHIT (2007) system CCHIT standard.
allows doctors to mark specific information as data Authentication As EMR Prototype Security Com-
which is invisible and forbids access from all of ponent System (Security: Authentication)
another user. This policy which is called “Break the
glass”. This special information important to writes Authentication is an activity to confirmed data
information about patient’s disease as complement validation which is given is correct information.
of information that existed in their health records. Base on CCHIT (2007) authentication is the security
“Break the glass” policy make user can access this system’s component which consist of some criteria :
special information. (1) User’s authentication before Protected Resources
Based on Abdelhaket al. (2007) “Break the glass” access, (2) System requires strong user’s password,
policy make medical staffs can open patient’s health (3) System can detects inactivities from session,
information by force when in emergency condition (4) System restricts wrong consecutive access , (5)
or when the password cannot be use. Access is System can do reset password, (6) The presence
owned by each user based on health care facilities of reset password command, (7) System provides
concerned and only caregivers who can access feedback information to users, (8) System use
information from their patients in their care. The EMR user name entry which case-sensitive, (9) System
Prototype doesn’t have “Break the glass” policy yet. provides facility to change consistent password, (10)
System use alfa-numeric character password, (11)
Audit As EMR PrototypeSecurity System Com- System saves password in encryption form, (12)
ponent (Security: Audit) System can prevent the use of the password back,
Based on CCHIT (2007) audit for EMR to fulfill (13) System supports parallel authentication with
the components: (1) System equipped with audit, NIST800-63.
(2) audit content, (3) Administrator’s ability to read The EMR Prototype doesn’t have the connection
information in audit, (4) System’s ability to do time facility yet with other media include to save and
synchronization, (5) System’s ability to export in UTC accessed by other media, so for another function
format, (6) System’s ability forbids user which doesn’t unfulfilled. Besides, password and user name
have the authority to access audit, (7) Administrator’s entry has been used for EMR Prototype system
ability to activate and nonactivate audit, (8) System authentication. This is done for user’s comfort, so it
supports logging to audit engine. will not easy for misusers by another parties to enter
The EMR System have to complete with audit. the system by force. However, the probability this will
Audit is documentation to all of the activity which happen is small because EMR Prototype doesn’t use
have done by all of system’s user. ATNA (Audit internet network, so it will be complicate to open the
Trails and Node Authentication) sets audit which is data by force by somebody outside the system.
contains about users, status, login time, logout time, Based on CCHIT (2007) prerequisites criteria in
pedan and audit level. Audit functions to search CCHIT for EMR security system documentation is
user’s activity in the system which is indirectly use system have to completed by system configuration
to detect the security of the system. EMR’s audit can documentation and security system control for users.
only accessed by system’s administrator. In EMR Based on literature view that had been done, The
prototype audit can only accessed through database EMR Prototype doesn’t have documentation as

ISBN: 978-602-73865-5-1 69
Proceeding of The 1st International Scientific Meeting On Health Information (1st ISMoHIM)

security control EMR guide. The EMR Prototype ensure the implementation of the release of health
security documentation unfulfilled (0%) from CCHIT information effectively and safely in the EMR, so
standard. The EMR Prototype doesn’t have security that the data contained in it can not be misused and
documentation. secured.The Government of Indonesia does not
have specific rules for EMR. EMR in Indonesia still
Technical Services As EMR Prototype Security
has to be fixed for a standard memenuhui CCHIT.
Component System 9Security: Technical Ser-
The government could consider CCHIT standards to
vices)
make special rules in the creation and assessment
Based on CCHIT (2007) technical security EMR.
service system in EMR consists of : (1)System’s
ability to protect information through internet, (2)
REFERENCE
System sends password in encryption form, (3)
System doesn’t show password when inserting Budi,S,C. 2010. Pengujian Sistem Keamanan
password, (4) System’s ability to save data in Prototipe Elektronik Medical Record RS.
encryption format when accessing through web Papyrus Berdasarkan STandar CCHIT. Tesis.
browser, (5) System can protects data integrity Universitas Gadjah Mada. Yogyakarta
which send through internet, (7) System saves data
CCHIT. (2007) Ambulatory 2007 EHR Certification
in encryption format in portable media, (8) System
[Internet]. Available from: http://www.cchit.org/
supports to save in mobile device, (9) The presence
certify/2007/ ambulatory-2007-ehr-certification
of warning message when user logging in. The EMR
(accesed 30 April 2016)
Prototype can guarantee security technical service to
desktop computer user and its application. However, Computer-based Patient Record Institute. 1999.
doesn’t have security technical service system utilize CPRI Tool Kit Managing Information Security in
internet network, so that EMR prototype cannot Health Care. Computer-based Patient Record
accessed by laptop and smart phone. The EMR Institute: Bethesda.
Prototype’s prototype and design have similarity in Hatta Gemala, 2008. Manajemen Informasi
EMR system and utilization of internet network. Kesehatan di Sarana Pelayanan Kesehatan.
Base on literature view which had been done, Universitas Indonesia: Jakarta
The EMR Prototype fulfilled 22% CCHIT standard.
The research mentioned from 9 components which Menkes, RI. 2008. Permenkes RI No.269/MENKES/
used to do the prototype observation in EMR PER/III/2008 tentang Rekam Medis. Jakarta:
prototype, there are 3 components which exist and Indonesia
6 components not exist in the EMR Prototype. Rohmadi,et al. 2013. Tinjauan Fitur Keamanan
Data Pasien pada Sistem Informasi Rawat
5. CONCLUSION Jalan Berabasis Komputerisasi di Balai Besar
Confidentiality of data is a method of protection Kesehatan Paru Masyarakat Surakarta Tahun
against unauthorized access. Health care providers 2013. Karanganyar: APIKES Mitra Husada
should pay attention to security aspects and Karanganyar

70 ISBN: 978-602-73865-5-1

You might also like